General

  • Target

    fa8061ff7d9857617e9099661f81b31a35ac216c05aebe8b5d44c13a15154097

  • Size

    74KB

  • Sample

    231212-csb8psdcfn

  • MD5

    2a5d0aa84186924f2182c3af6f7e7750

  • SHA1

    5e6b9d71f07770167d4792caa002be40c126777f

  • SHA256

    fa8061ff7d9857617e9099661f81b31a35ac216c05aebe8b5d44c13a15154097

  • SHA512

    fc9a91559aa56ae263f49e440ff59911c6833e7d3b62c4beeec3f31c66bc47d92dc59c921366abe20d9e807a505a3a84d81e26bb9f57c35fb5ad830ab23f3a7d

  • SSDEEP

    384:w75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:w7Hj5L9Mh7gvhmJPTJQzKy9u

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.jaazgroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cincin/123

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      NEWPO_AH02111122023_pdf.exe

    • Size

      23KB

    • MD5

      2fb49f8666cd78b0ccc746c97c2d76d2

    • SHA1

      72b378efc36eba9d1b444ce7a2f7bcb9794c2f0e

    • SHA256

      6847ce75c0375d36e337e422751753c4b7ff87fb6d2c00d5ef59911427f89d0d

    • SHA512

      2109820c70352b000bdf1487947540cc4362a5f531a22d04dee7d7aefddce441dbfb882662ef2059e50a5b5671b3b8bbadbaa9f8df51eba38dbe7168b446eec3

    • SSDEEP

      384:s75dqurNFZ3I+F52Bjh7gmkODaglshmJuSxFv5JQzKoX9u:s7Hj5L9Mh7gvhmJPTJQzKy9u

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks