General

  • Target

    125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4

  • Size

    614KB

  • Sample

    231212-bt9d6acehl

  • MD5

    872cb6f0e8451a60e514851cdd2aa3d3

  • SHA1

    ce73360c76ba965ec74704e97d169eaf2cb5afc5

  • SHA256

    125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4

  • SHA512

    b8a772a531e61eb3444bc0f2ae5c8037acba781b4319b5c2e1760d1267bf279d1572c3917c51127b172a033b5b43efa9f6dd86039a877c56c5077c6fdb8e42be

  • SSDEEP

    12288:43IU8S6eUd7rHtoZIaDOnAWPYJV84yGRU8h4NYCYETsF1h:WItSAd7rHWZIaqAWuU8mN1YRFL

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4

    • Size

      614KB

    • MD5

      872cb6f0e8451a60e514851cdd2aa3d3

    • SHA1

      ce73360c76ba965ec74704e97d169eaf2cb5afc5

    • SHA256

      125a0c5ed0934067110aaaf3b728d2509a12aefa9b820b8964ba303396e3c7b4

    • SHA512

      b8a772a531e61eb3444bc0f2ae5c8037acba781b4319b5c2e1760d1267bf279d1572c3917c51127b172a033b5b43efa9f6dd86039a877c56c5077c6fdb8e42be

    • SSDEEP

      12288:43IU8S6eUd7rHtoZIaDOnAWPYJV84yGRU8h4NYCYETsF1h:WItSAd7rHWZIaqAWuU8mN1YRFL

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks