General

  • Target

    JaffaCakes118_29d453ba35435891d53069e6250dcf63

  • Size

    660KB

  • Sample

    250106-sabr8a1qap

  • MD5

    29d453ba35435891d53069e6250dcf63

  • SHA1

    ca87eb53200bebfbbec78642aa0458d701ca223b

  • SHA256

    e741a7406888ef2c26cf04c5c39afdee7337060e2026c5dbf2033e80edc12c81

  • SHA512

    ef82c4e5a935907578e910fb196a42eea9addcaa8e487a82129a2775824aed435456ebf57dd0b9acee262838c42766c2b7905f69e99b3ac3a32f4e61461ee9ba

  • SSDEEP

    12288:1wrMG7OnwT8mZgt7DB/orcAjb/0Hr+ZFsYsvb1vtkutHVp:4OnwT8mytZa9KdZb1tku5v

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO PJS-4000079.exe

    • Size

      573KB

    • MD5

      32a9bdf8ead718570533e627e2b0a15a

    • SHA1

      b831848f2be003c7ee06a46e51253807048acaaf

    • SHA256

      92aca1894f0493a26dde546c3c9e377be17244b01ee1145a48b997fb56c5e6b0

    • SHA512

      7c2e33a1917ee5546106c28b40e8bb9edffbe2ac0fb26ef54925886ffc58a9a0598bcb87c00f14226ee4a2b261512a293e3c43d2cd548bca1e0fad9c2923ce11

    • SSDEEP

      6144:ztOD8+cFpaN3KayBY7BEK/DKjP92YltDsEojYGj3Y8v0AAYT91h:ztODQnXYJ/DwlP3qY80Sb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks