General

  • Target

    d3d5c8dccab0189ae7e455ff52fd870d3fc9e7b0b3dbebeae8f8497dfd695a74

  • Size

    621KB

  • Sample

    231211-m45z9sebg9

  • MD5

    df2c1a614593c7b5eb974b807e3a0208

  • SHA1

    fc0b4388d4da4398c86bf87bebc573e87a1a986a

  • SHA256

    d3d5c8dccab0189ae7e455ff52fd870d3fc9e7b0b3dbebeae8f8497dfd695a74

  • SHA512

    88fac28dc600767209b3db21e7141701ee2d4470400dc066ac738cca4673721beb6a57ec7eacb0daf62c2c05f3457f514647af29da436b54132d7a048a0835d9

  • SSDEEP

    12288:x4dFJ4amO8QxEG/yCYSTom0gafmpGL/ZWtyxNESr3k4UXsl:wGrQCCY407L/EtyxNESrDUXsl

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO OAU_DECQTRFA00541·PDF.scr

    • Size

      985KB

    • MD5

      111317166b36b912115a088ebcdacbbe

    • SHA1

      839c631b48ade41e44476c474e16d17a2c9f3973

    • SHA256

      21bef58cf084c50303e71db19d94deda6e858387718ed29459a80ffa4f6aa2cb

    • SHA512

      4491a6a69b669643fbd1e4992ff83dbf136796fd4d301e2d0d95ae371f9e55e881e830a69f9f0c9278cbfccc58b95251d067c8441a9caa6e13fad7c563f2ea3e

    • SSDEEP

      12288:E6ZCUU8aTj+Ak0rdgjycrGzpMWG4F1wXCDKJGmMZN14n+1OV2CPAY:i6an+ABxoycrGdV3F+XrJGHN14+QhIY

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks