General

  • Target

    JaffaCakes118_e6eba2fa78a28934329a2413ba145fabcd34210cea4aa5c80da91251b9f12f03

  • Size

    700.7MB

  • Sample

    241226-2mpdhstnbk

  • MD5

    321757a25dffa5f56075a450a64394cc

  • SHA1

    ed09d1bfe6f51af3b8c1af1d5d014248c983487b

  • SHA256

    e6eba2fa78a28934329a2413ba145fabcd34210cea4aa5c80da91251b9f12f03

  • SHA512

    2b4a72c2a7174b660172e866f6eac593ef5333d003bd3eaf1995b292bd27a3b31551ef369c3b948281e250731986a456219dbe22f1f204af6d94e7a0a5f342f4

  • SSDEEP

    12288:qmXpM1JCIQfNsVcuoQHk0sM2EHgdAbGTHHQie3LL2J2OXr5HYX:61KNooeHKVTnW3LL7OXr

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Order Specifications.exe

    • Size

      700.7MB

    • MD5

      f7f3ac6a915ba3676bed9ef5642d9cf2

    • SHA1

      abfeb38415b1301614567227c08727600aed6e02

    • SHA256

      1ef76d6263cbe6db036d76ef3e075e17ec90d429c60819deb85f88473bbf2944

    • SHA512

      439330e759e4151f2c45b2fc0feda82a26b59882cd5fdbe195a6ead7b161632c30d7816e0c3cb35241de063baae338bbab75864ed71c25bcc06cc2ffd63734ea

    • SSDEEP

      12288:umXpM1JCIQfNsVcuoQHk0sM2EHgdAbGTHHQie3LL2J2OXr5HYX+:u1KNooeHKVTnW3LL7OXrJ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks