General

  • Target

    3f49bb54c8f0b3f7658da5f823073b0852777fdebbff743697a8349b185a1d4b

  • Size

    1.2MB

  • Sample

    231213-bvsg2affa6

  • MD5

    a8c2ca593bf9a3a2675bf869db2518a2

  • SHA1

    86460cd908ab58813c1221831c6530727c5e960c

  • SHA256

    3f49bb54c8f0b3f7658da5f823073b0852777fdebbff743697a8349b185a1d4b

  • SHA512

    ffa45fc684dd6f48d91d86bae9e6926664cdeb0b3b1ab36d379255181e2dde5d6a789aab9d574e6e6ffa4d8835e79680448ab76d07e542443d1f0aed25fcd8eb

  • SSDEEP

    24576:kItSAdQ0OzscK3R45X1e+Nx/i1FvyyYm0oR7Q:ktXnxK3ROZD/+xR7

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Zaplata,jpeg.exe

    • Size

      645KB

    • MD5

      df5f655433b8f20a6ba72aabd3738a15

    • SHA1

      7375302c7359d09cb7cff0923da0640adf5b4b63

    • SHA256

      d574783b27fe3548f26fdcf15380559464604eced80c5feaac6a6d5639c0c7cb

    • SHA512

      db5d5870e29bb650aa8e585eba597284a4eb61f98da3fb00e2064a9f8d81ea162f6e86d591860f4cbf6d12f522be7766dd039b53eb23f424d06f9d6d476c4033

    • SSDEEP

      12288:7d3IU8S6eUdQ0OS6s54d7NLErjfkIRS5j71e43Nx/i1FvobY5Ym0X4R7LMc:xItSAdQ0OzscK3R45X1e+Nx/i1FvyyYH

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks