General

  • Target

    LPO-2024-357.rar

  • Size

    596KB

  • Sample

    241129-ph3n5avmfs

  • MD5

    72ecb7f78c3c2d8ef9c3c47fa9a2f42f

  • SHA1

    22dbe091999b28f3622e3026235543de65e1c86e

  • SHA256

    2ade1b23feab6829b32b569b6101dbee9966a78a967051b2e1f64d36b74bc49a

  • SHA512

    744261bd6b733aeec9f19facce717d59fb61178c8cc9acf9a5f643e35fa5e7076cb71627730eae64e229c4cba2a7cd2b601ec0b0fc21f42e72add67405edc312

  • SSDEEP

    12288:TFrO/VYbVIpc6FbcW1h+SPBuGTHyO54Fx3CjYznuenTUbqsAtZ4fUlTuEd4Pyw:TFEVMqpnoyh+8VyByjToQd2Z4fST5syw

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      LPO-2024-357.exe

    • Size

      692KB

    • MD5

      b15e3e1eb0abfb4967c65bf33665fcbb

    • SHA1

      fcd702629c1e38b7d08df3628920c22d4dab9a40

    • SHA256

      137e0a944efefef514d0595cdfade088a59eb12404a1469e76cd024ebdb2d1f1

    • SHA512

      b4bbcda8556f487ec07b4c95cfb9a0627418107a62d70cdbdb293048e3483441f4a45cf36bdbfcf44a9cfe7f348a53a39f8f668fd8ee98aac81cf32be593d820

    • SSDEEP

      12288:sF2iNCTsv+SGjpA3yKUUo6aZ9p71raSBSf3t5Nppl1MakspSrZhA/9JQZsGoIU/:G1M1xjj9p7F8HjB0NhA/9WsGS

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks