General

  • Target

    INVOICE and DETAILS.zip

  • Size

    603KB

  • Sample

    231212-r1bdpsgch5

  • MD5

    516e0089f8b70e7848055d604e388d94

  • SHA1

    b79bf21a39b97a3274bc1797a479b8099f2f68a7

  • SHA256

    76b402a31a8cd4ee98a898f093d337f47c5e799baf0e2a00d127be0e37433bca

  • SHA512

    71fdedae7f70b4510888aad5fdcb23b137bc4fbf31a2f4a89bb92a77d20c03a0920d6a6a66bd66b50b91622478ce0a1213c3d464792460345a053d71d89f8e5e

  • SSDEEP

    12288:Vx4FtwyU99jZM8kAZSVuI4lNd/Vb8E+NHAkEgPadgZvpUt:4FeyUfWy9Iodbh+NHAkEgSdgZ2t

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      INVOICE and DETAILS.exe

    • Size

      621KB

    • MD5

      12528895f0306755c4fdee8ba97d89d1

    • SHA1

      408636fe1438ba5f210705057beaf9a746ea83f6

    • SHA256

      4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74

    • SHA512

      b139b1a7d08833490e4fa3872391a4b953e0fd97700e46315d86ac41243368b02c3de1d36621e1b9e430018867a9b0211fc48a7c9d1a68cc17af685ce18cb0c7

    • SSDEEP

      12288:L3IU8S6eUdsQKwNsP4xcI1MJwNfA/R4lPd5V18EENHSkkEDWYAj:7ItSAdsQK3I1RNfA/RwP1hENHSkkEKD

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks