General

  • Target

    JaffaCakes118_516ff38ba427313b885e073871a43734

  • Size

    357KB

  • Sample

    250101-mfg9assjgx

  • MD5

    516ff38ba427313b885e073871a43734

  • SHA1

    c78d47d291976fd4269909ad3f033cb88644b20d

  • SHA256

    97d82c995cf5b9a86792c4b115a4920ae63ccfe2f363aede44be78de634a51b2

  • SHA512

    e5c215dc1c148bf7b3d21ee3f2ccdee0c0fe270ff470a666f7278bba1d1d8429c8e10ac5cfc0e8c332808559d2ae6cc0250f4acef17a5bff3eb5409901a62d61

  • SSDEEP

    1536:EUpiCntMlb7wZ3uRA2IIRB8KishmCQhOMxIiE9oJl8Cjejk7csRPffpUa60Y8JoV:N3G

Malware Config

Extracted

Family

agenttesla

C2

http://103.125.190.248/j/p1a/mawa/d68fbb027e9c4963e967.php

Targets

    • Target

      JaffaCakes118_516ff38ba427313b885e073871a43734

    • Size

      357KB

    • MD5

      516ff38ba427313b885e073871a43734

    • SHA1

      c78d47d291976fd4269909ad3f033cb88644b20d

    • SHA256

      97d82c995cf5b9a86792c4b115a4920ae63ccfe2f363aede44be78de634a51b2

    • SHA512

      e5c215dc1c148bf7b3d21ee3f2ccdee0c0fe270ff470a666f7278bba1d1d8429c8e10ac5cfc0e8c332808559d2ae6cc0250f4acef17a5bff3eb5409901a62d61

    • SSDEEP

      1536:EUpiCntMlb7wZ3uRA2IIRB8KishmCQhOMxIiE9oJl8Cjejk7csRPffpUa60Y8JoV:N3G

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Drops file in Drivers directory

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks