General

  • Target

    JaffaCakes118_e2df9e0287a3f974981718891b00d394d137ec08301708a358464ccb0e624471

  • Size

    94KB

  • Sample

    241225-ehhnvaxmbk

  • MD5

    e6a437d39d831dc07748f71fb788c4ea

  • SHA1

    57ec10492faa05b2aec0081e1baceb8b6854a71d

  • SHA256

    e2df9e0287a3f974981718891b00d394d137ec08301708a358464ccb0e624471

  • SHA512

    724b34a21ee55509d081236ee8357a27b5fdeed461663803dcea6cf4247cf4b84b3fcacc56b44783c671caa90b856ebf974ede7c82ae97f81222bb94d85ef6b3

  • SSDEEP

    1536:jgHbv/OuXB1qKQ5YZlVcUfnrbmX5oh3/XsnVGk6jKUDkxwh0CnnWK:jgHbv/OuXB/R9zHgGTNkz+b

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.vvis.com.ph
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    May192017

Targets

    • Target

      fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1

    • Size

      208KB

    • MD5

      6c0c6a5a66f4ff1b21325cb9d069e115

    • SHA1

      73b0a7cff74ae8191f0cc33ba48053c260dc767f

    • SHA256

      fdda2277625cf95b5fee831d58cf5ab0606bc81a832669c4c5f7469b5d7048e1

    • SHA512

      dede722b3f3d0dfa4b97b296f35653f47c985079b691eea3e6e3c3e21a54b3236af940658f6887a36051583e6c6795afd00284cd951cbbea0222360a802b6be2

    • SSDEEP

      3072:6mnojXT/SrCpGWEg18eXIV0E7Wh8Ffdl/Q5UX6RUG4dFVc4mWSUansTZYRp7uIt2:6mnqIV0E7WhylUUX6RUGKcHflpN2k3

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks