General

  • Target

    f9463d9c2f292beae964eef71739e060_JaffaCakes118

  • Size

    283KB

  • Sample

    241217-3qq7yssqfv

  • MD5

    f9463d9c2f292beae964eef71739e060

  • SHA1

    27629e0354a72d063772ab0a44c36898b51a1194

  • SHA256

    be3453f1cc2e279d9dcb10b1238d0c492fcb21537340444a7859d5c317c7bca2

  • SHA512

    2e9ae41abd87531e2412db81893fcc15a9628f6dcbfd8e696af6eb8af8ee72f2757adae3c9da5bcd108be651fa4ced6f065edfd01a1bf60a7d7c66c922040f82

  • SSDEEP

    3072:1iCKSxGuKheuHOMTzJGCtV0qxPgVGJ4g69tc6wiXm+oVdDsNMhE4iYs5HayMiESK:1QnJxBJ4g6oiW9pEMhECscv3Aj/gIYE

Malware Config

Targets

    • Target

      f9463d9c2f292beae964eef71739e060_JaffaCakes118

    • Size

      283KB

    • MD5

      f9463d9c2f292beae964eef71739e060

    • SHA1

      27629e0354a72d063772ab0a44c36898b51a1194

    • SHA256

      be3453f1cc2e279d9dcb10b1238d0c492fcb21537340444a7859d5c317c7bca2

    • SHA512

      2e9ae41abd87531e2412db81893fcc15a9628f6dcbfd8e696af6eb8af8ee72f2757adae3c9da5bcd108be651fa4ced6f065edfd01a1bf60a7d7c66c922040f82

    • SSDEEP

      3072:1iCKSxGuKheuHOMTzJGCtV0qxPgVGJ4g69tc6wiXm+oVdDsNMhE4iYs5HayMiESK:1QnJxBJ4g6oiW9pEMhECscv3Aj/gIYE

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • UAC bypass

    • Disables Task Manager via registry modification

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks