General

  • Target

    b6c6e4e30228a0d456f676303b0e9a71432bed674cb11a749f0a018fce862204

  • Size

    1.2MB

  • Sample

    220521-bpvefafccq

  • MD5

    66afe2da6b4a7089e822abf3086c15b1

  • SHA1

    b93d2c51568632075371d3dc0e7cc7af5a23f4aa

  • SHA256

    b6c6e4e30228a0d456f676303b0e9a71432bed674cb11a749f0a018fce862204

  • SHA512

    58b50ccce5561dbaeb8f83afccc40c19032a7fc1faa324761b8b3cecea30079b7dfa0eecf41b19b7adb31140f5100112e370f57d4af89aca92c70b59bcc5a5b1

Malware Config

Targets

    • Target

      LULUZHEO.EXE

    • Size

      449KB

    • MD5

      ebeddd594f603b5bdb8423e5c66c6173

    • SHA1

      6d2c7b328ed3052e9df7c6e78a5de31689b3139a

    • SHA256

      42f0c2ab662dc2394eeb19056564b07ea7caf76e9b5a67ce8f44f99c99524098

    • SHA512

      e06f71193183c2002f71727a2f7d6df59ae29a2afacf533682cc3e38c6cf198f88e6fcb8501736d3360b27f949b6bfc38f20fda1f59d5b92536a995d5eb10002

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • AgentTesla Payload

    • CoreCCC Packer

      Detects CoreCCC packer used to load .NET malware.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks