General

  • Target

    1cc4b5233db6920249554ab7710cff8b.bin

  • Size

    222KB

  • Sample

    240110-bhqgxaahgn

  • MD5

    3f5bc0d562a603f6db13a4e6bc2255ff

  • SHA1

    106c6a5b78aa709327ada9ec3197f79bff1b6dba

  • SHA256

    14c05a8dce914f2e8e6dc5125f049a32b9377aa12eb8a82dae4434a7f840f28a

  • SHA512

    fc8287c42890b4e057e91dcd42c43613b6b5062ce343306ac2785deb31b67ea32566dedfbf0a36fbc37fcaac1f217aeb5c420a69b4f7cfbb37b41b188652c8a6

  • SSDEEP

    6144:QGL+ZHZ57zCXpWYzBR+P+Hdo+UQftMVNA7d2tWqE:TqP7zUWGR+4dTUvVEWZE

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Zamówienie. CONSTAB PR 00701 LD_pdf .exe

    • Size

      445KB

    • MD5

      01035dfa446d409d0d29031976542b11

    • SHA1

      6fe70938bd3cb9e18531df4ee812751f4e7fbc7f

    • SHA256

      c45444742c9f216bfe87e46a23c2f47e633a815b97b65f4d809331f8a6da396f

    • SHA512

      334d7b7028e0fd82f1936c9489c99ace5055167e44654cd902d001af44c28195bf4b7031e67a83e89f055008ea97a95dcb7a27045834f85e0a8ce04a2670f864

    • SSDEEP

      6144:fRIeIzL0Iygqms9zMifVAJI8j5mepjJ700gtTbS7i2XThZwfQq:JTIyxjpEhIe/00gti7i2XThZfq

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks