General

  • Target

    60e4539ca98b01b697d5f3bb560e413045303426b4396e077ee3b16720547ac6

  • Size

    624KB

  • Sample

    231212-cpjhlseef6

  • MD5

    46fb62c4e2805486028b53e1811c6d11

  • SHA1

    b5e6e737ba9cc43cdbd3705d89772d0e8d038ed6

  • SHA256

    60e4539ca98b01b697d5f3bb560e413045303426b4396e077ee3b16720547ac6

  • SHA512

    8e09a0b2fd1800fca8a8337229df152520bdb84ea355e27ce7010ea133fa26e0180d0e0594ec5b838e4cedcb2245387aa509fbfe9ea89bd1beaf1314172c7c10

  • SSDEEP

    12288:dg1JDzr0mA+qQ81ogXMdnbUmlOGbqa6a+aJq/ulYZjTUUeA7sfHREjbEeD:dg1JwmRqQc185bZllqa6a+Du+vUfHRIT

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      PO202033467382TKZ.exe

    • Size

      699KB

    • MD5

      ad4390933035114071374ef995b920fd

    • SHA1

      eeab6dcbcf6238460fa7332fce8e943877da1ab7

    • SHA256

      597de5e7640065085edfa3bc1a3f24cd5f5c3364882285bf97520fd1f7e40bcc

    • SHA512

      0d739ede77bef79ede6c2e071eb2be6588fde2e3ba3cbf725dd97ebd66fda725f88f6b32287dba9f8efbe3fc789fb16391be084396d897652c1bb6b3495270c8

    • SSDEEP

      12288:+3IU8S6eUdDBlRA+qqMogX46nD28AVapphqs+RkXyhJZVBb4a7sfH810bm5:UItSAdDBlRRqZ1IcD9Ayh7+oyhJaXfH0

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks