General

  • Target

    98eb5a8ced69f5206ca98a8ed29e97d79c96d5261a7d79886c2b0c405e8f9e6e

  • Size

    624KB

  • Sample

    250122-lq4dva1kcn

  • MD5

    1dbee1653e60661fffa95771004e5b1e

  • SHA1

    997038f6ab95c46451ddc953547c9724fe3df5df

  • SHA256

    98eb5a8ced69f5206ca98a8ed29e97d79c96d5261a7d79886c2b0c405e8f9e6e

  • SHA512

    462cbab4c81fed59d9520cd48444b6af21cddd1ad9f79d58b761f21b53e1e5faf8a48e2095f65b65b3867316823993020495ad16800ca5af1f1e7c9482b5a9d2

  • SSDEEP

    12288:MZBgLxy3f4pZ9fRzyt4v1+IR7QgsrVGF6kWe+LB8ahyc+0A6jGLanCqS1:8BYM3fUZT+t4vH4OvWeQueyW3YanCq+

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thelamalab.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Thel@malab@20!9

Targets

    • Target

      RFQ.exe

    • Size

      703KB

    • MD5

      d5e2b4134debd3c4b82f7655d093ea99

    • SHA1

      46c0d741c6e6891328963ece4ec79275eab8f41f

    • SHA256

      5d4c512b103d94b3ee9a4840cfe788eebc9c6ff4e5ce5a38aa47385b97d32987

    • SHA512

      542fda72e566a657dd92b927327c91286abbe8cd449a37766c19d0544de9d6574b0112a680dde4da49c1491ce812ae7c233169228dbfead0468f7f8ec49b8ffc

    • SSDEEP

      12288:KWa+h3UcyNfye27fJZytevZ6IRNQmsRpSF6CWe+LZ84VyIhlMoD:VNUFNfn2NUtevl6qHWeQmKyA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Agenttesla family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks