General
-
Target
3f49bb54c8f0b3f7658da5f823073b0852777fdebbff743697a8349b185a1d4b
-
Size
1.2MB
-
Sample
231213-bvsg2affa6
-
MD5
a8c2ca593bf9a3a2675bf869db2518a2
-
SHA1
86460cd908ab58813c1221831c6530727c5e960c
-
SHA256
3f49bb54c8f0b3f7658da5f823073b0852777fdebbff743697a8349b185a1d4b
-
SHA512
ffa45fc684dd6f48d91d86bae9e6926664cdeb0b3b1ab36d379255181e2dde5d6a789aab9d574e6e6ffa4d8835e79680448ab76d07e542443d1f0aed25fcd8eb
-
SSDEEP
24576:kItSAdQ0OzscK3R45X1e+Nx/i1FvyyYm0oR7Q:ktXnxK3ROZD/+xR7
Static task
static1
Behavioral task
behavioral1
Sample
Zaplata,jpeg.exe
Resource
win7-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cock.li - Port:
587 - Username:
[email protected] - Password:
zaq1@WSX123 - Email To:
[email protected]
Targets
-
-
Target
Zaplata,jpeg.exe
-
Size
645KB
-
MD5
df5f655433b8f20a6ba72aabd3738a15
-
SHA1
7375302c7359d09cb7cff0923da0640adf5b4b63
-
SHA256
d574783b27fe3548f26fdcf15380559464604eced80c5feaac6a6d5639c0c7cb
-
SHA512
db5d5870e29bb650aa8e585eba597284a4eb61f98da3fb00e2064a9f8d81ea162f6e86d591860f4cbf6d12f522be7766dd039b53eb23f424d06f9d6d476c4033
-
SSDEEP
12288:7d3IU8S6eUdQ0OS6s54d7NLErjfkIRS5j71e43Nx/i1FvobY5Ym0X4R7LMc:xItSAdQ0OzscK3R45X1e+Nx/i1FvyyYH
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-