General

  • Target

    JaffaCakes118_8b449c05d607a3e90b62b5f91118e219

  • Size

    216KB

  • Sample

    250108-e37tgawpbp

  • MD5

    8b449c05d607a3e90b62b5f91118e219

  • SHA1

    1698004fd1039142522dcd6e924df5620bae597b

  • SHA256

    b3d979fd0876b2d43950db136e955040858bbad86b047eecf937218be20a7171

  • SHA512

    00d505649b308d7275e7b5901e1224ffdae0dc9020cd4a561e29d24d020bc6e7cc7e70ab4f009c204783aa06cb6782b3dcd9d8463c20fc1fb604b14a9ea6653f

  • SSDEEP

    6144:4eYMz+FU7+m+VEPorCl09wr3WeQX7lVyUH:4eYMKs+APNl09C3srnj

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      JaffaCakes118_8b449c05d607a3e90b62b5f91118e219

    • Size

      216KB

    • MD5

      8b449c05d607a3e90b62b5f91118e219

    • SHA1

      1698004fd1039142522dcd6e924df5620bae597b

    • SHA256

      b3d979fd0876b2d43950db136e955040858bbad86b047eecf937218be20a7171

    • SHA512

      00d505649b308d7275e7b5901e1224ffdae0dc9020cd4a561e29d24d020bc6e7cc7e70ab4f009c204783aa06cb6782b3dcd9d8463c20fc1fb604b14a9ea6653f

    • SSDEEP

      6144:4eYMz+FU7+m+VEPorCl09wr3WeQX7lVyUH:4eYMKs+APNl09C3srnj

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • AgentTesla payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks