General
-
Target
LPO-2024-357.rar
-
Size
596KB
-
Sample
241129-ph3n5avmfs
-
MD5
72ecb7f78c3c2d8ef9c3c47fa9a2f42f
-
SHA1
22dbe091999b28f3622e3026235543de65e1c86e
-
SHA256
2ade1b23feab6829b32b569b6101dbee9966a78a967051b2e1f64d36b74bc49a
-
SHA512
744261bd6b733aeec9f19facce717d59fb61178c8cc9acf9a5f643e35fa5e7076cb71627730eae64e229c4cba2a7cd2b601ec0b0fc21f42e72add67405edc312
-
SSDEEP
12288:TFrO/VYbVIpc6FbcW1h+SPBuGTHyO54Fx3CjYznuenTUbqsAtZ4fUlTuEd4Pyw:TFEVMqpnoyh+8VyByjToQd2Z4fST5syw
Static task
static1
Behavioral task
behavioral1
Sample
LPO-2024-357.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
LPO-2024-357.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Targets
-
-
Target
LPO-2024-357.exe
-
Size
692KB
-
MD5
b15e3e1eb0abfb4967c65bf33665fcbb
-
SHA1
fcd702629c1e38b7d08df3628920c22d4dab9a40
-
SHA256
137e0a944efefef514d0595cdfade088a59eb12404a1469e76cd024ebdb2d1f1
-
SHA512
b4bbcda8556f487ec07b4c95cfb9a0627418107a62d70cdbdb293048e3483441f4a45cf36bdbfcf44a9cfe7f348a53a39f8f668fd8ee98aac81cf32be593d820
-
SSDEEP
12288:sF2iNCTsv+SGjpA3yKUUo6aZ9p71raSBSf3t5Nppl1MakspSrZhA/9JQZsGoIU/:G1M1xjj9p7F8HjB0NhA/9WsGS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1