General

  • Target

    a1045bc7406e2f0cb992d569501278bef67b6e644185b7662de59fafe1b9c377

  • Size

    609KB

  • Sample

    231212-ccj9dadacj

  • MD5

    d756e293c97b13c064ec35d1d5f6c074

  • SHA1

    52dda6a5bbcdcb8f531ad17f7c00418b634bcf04

  • SHA256

    a1045bc7406e2f0cb992d569501278bef67b6e644185b7662de59fafe1b9c377

  • SHA512

    ebb76e610774c7f47bbd600749037793d7735d0aa99989e50959fc1bb986d969c93e4ac4ac78157f8a95aac1f8e3f1c84fdcf56f5e114daae390a9d9d3b61ef0

  • SSDEEP

    12288:arvD0V15ImM9D4kGiskPTGlNBu3c5IfpxP1qiSf4rWrRi2NxmJRXEUEf3UfZj+R:aLgVLFM9lYuGlDu3cef7Ajwa9/UbbEfr

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      CoLYHfsA7mnOFfW.exe

    • Size

      648KB

    • MD5

      8afd8346a60583275b120bcbffb85af2

    • SHA1

      872e8a84eda1e1402dc1bfaefd4abdff3475b43f

    • SHA256

      ef030162bcf9de1409f69b87233b1ba9d256349773ba623ae4816cc39827c4cf

    • SHA512

      eae8fe52465aed2fa69a40c81f6e7682a098a311d9858fb44fccfb639f8cfa339427b1b6ff322265501e694916cd090c9837c90ca11115dd16cd35bee9b1df96

    • SSDEEP

      12288:pV3IU8S6eUdCSW+3LpeMgu0C6Nylpace9BbUyo0iWpe/mA:p9ItSAdCSW+3IMguZwcIRyWsuA

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks