General

  • Target

    23af2fb772bd5545965d7027eee074fd

  • Size

    442KB

  • Sample

    231231-ce9baadaf7

  • MD5

    23af2fb772bd5545965d7027eee074fd

  • SHA1

    9c251f1b04f9ae720fde9270aa1a16b05d5ebd6a

  • SHA256

    36ae717bae1f33b2d8726073f934fce844ca94e9eaa3503fb759d7c4b546ae10

  • SHA512

    360e2b814c80e63ca5f64c27e7e39599cc3979da8378084bf6343fdaa17a9fc9cf3470640a9231f6e5a38e793256fefd6a5b43fa23b8196c7874a4e76231a08d

  • SSDEEP

    6144:Ehew2rrFYHxwqmPHqWO/6MaWgSLPnJJmw+0mdLNI4BFjjIkE7SClUrQ:girFYRwJPKRR7fm1dC4BxjI1s

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.bafaqroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bs%K^dS2

Targets

    • Target

      23af2fb772bd5545965d7027eee074fd

    • Size

      442KB

    • MD5

      23af2fb772bd5545965d7027eee074fd

    • SHA1

      9c251f1b04f9ae720fde9270aa1a16b05d5ebd6a

    • SHA256

      36ae717bae1f33b2d8726073f934fce844ca94e9eaa3503fb759d7c4b546ae10

    • SHA512

      360e2b814c80e63ca5f64c27e7e39599cc3979da8378084bf6343fdaa17a9fc9cf3470640a9231f6e5a38e793256fefd6a5b43fa23b8196c7874a4e76231a08d

    • SSDEEP

      6144:Ehew2rrFYHxwqmPHqWO/6MaWgSLPnJJmw+0mdLNI4BFjjIkE7SClUrQ:girFYRwJPKRR7fm1dC4BxjI1s

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • AgentTesla payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks