General

  • Target

    INV-117624 LPO-3642.zip

  • Size

    625KB

  • Sample

    221128-pa2f4acb26

  • MD5

    9248c45f143661c902fa81bd17ae7f58

  • SHA1

    60e2f7951b4f9818a8653bb352633ee7236e9b0b

  • SHA256

    853c39d56c3740185e92073460219615e05415a91daa13fd5970c8d28a70c4b2

  • SHA512

    931cb81bf2d5e9854a2a7f0b84ddfed94ff958d2c1b587a352678348c0fc417bfca303d1a4883a9b715d75240a13b2533d62d1924429f2daf2a878e43788076a

  • SSDEEP

    12288:qwRbmxaSaPnTakUO2G920LTMBYS3wq6fkGw2ArzHtUflh2Y/ADpZf4Dem1:1OCTaQ94BpTyhwxrzadT/iZfm1

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      INV-117624 LPO-3642.exe

    • Size

      807KB

    • MD5

      40264f53f0f83bfd21df75e22db2b0ea

    • SHA1

      93171e1bd1c33212724b3b3e5238f0c83531fc7e

    • SHA256

      caef9e906b0768d4134a8fc2a9523554b23bb9980668c299106d1ace32cbbaef

    • SHA512

      7f7f85a39e3bce3f3c0465c97a3367f2d2860bfeb67d3f7a17f8342c7742d1280681fdefda5d1f418f64da22b7e6877e677134d8c36628389c06f4465fe9bfd6

    • SSDEEP

      24576:NU676CSkFg/IyXt5TKhwlZzE9H/0XPG5X:KlkoXfxZsf6Q

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks