General

  • Target

    JaffaCakes118_4978c9294fa547993e1410207950317f

  • Size

    412KB

  • Sample

    250107-def56s1kbx

  • MD5

    4978c9294fa547993e1410207950317f

  • SHA1

    7aafe5ec164c29940fc79f45e9aa41d56e134761

  • SHA256

    603484e36b856610fdfb6767f666c87c231291a85157f6a868e020d7c1c3cfa8

  • SHA512

    99be72c1bc36b7f08ebc768d95d0bd3d6beaf5281b16f771ea691bd1f65852a884cc937e4540ae1ca320f707ac94c37150e8f45327dc0088487d43c74aed3f27

  • SSDEEP

    6144:i3YYclrhzl4XPsASoLdm3ClEgDx+cocG20vmgNIxSVgs38buvFSAoy3W:ioJtzl4/mMdmWEggiG20jIsVtKuvF7G

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1990818097:AAEwom4DVSnyX5nLZhtvlrvCnmzUsVj23cE/sendDocument

Targets

    • Target

      JaffaCakes118_4978c9294fa547993e1410207950317f

    • Size

      412KB

    • MD5

      4978c9294fa547993e1410207950317f

    • SHA1

      7aafe5ec164c29940fc79f45e9aa41d56e134761

    • SHA256

      603484e36b856610fdfb6767f666c87c231291a85157f6a868e020d7c1c3cfa8

    • SHA512

      99be72c1bc36b7f08ebc768d95d0bd3d6beaf5281b16f771ea691bd1f65852a884cc937e4540ae1ca320f707ac94c37150e8f45327dc0088487d43c74aed3f27

    • SSDEEP

      6144:i3YYclrhzl4XPsASoLdm3ClEgDx+cocG20vmgNIxSVgs38buvFSAoy3W:ioJtzl4/mMdmWEggiG20jIsVtKuvF7G

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks