General

  • Target

    RFQ-KYL-2024-E0002-B(02).exe

  • Size

    191KB

  • Sample

    240129-nyw1vaafap

  • MD5

    0609cfc660c0dedb0e28217cf1fb7fbf

  • SHA1

    1e75d9cda16c9b343baa9ee65c37cd84d5b56055

  • SHA256

    55cd2f21de67fd054ed1f7337cb5483408ef085348cce685be7752615ca7667c

  • SHA512

    c6fda97135e6c374a2f5f6337593772ce7a463c4a9423b7a269ab98b98588d885fa11331fefbaf8e2c6e6d9f3dd4e3f836045d3d1b59e0fd8bd9728262fc6f67

  • SSDEEP

    3072:77QzuorbyWV0uXiJoLd64+Auk3dORlEMgK:YzuMWWVp3Z64+Auk3dORl4

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.macfinmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ^6&Z=C94llIn

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      RFQ-KYL-2024-E0002-B(02).exe

    • Size

      191KB

    • MD5

      0609cfc660c0dedb0e28217cf1fb7fbf

    • SHA1

      1e75d9cda16c9b343baa9ee65c37cd84d5b56055

    • SHA256

      55cd2f21de67fd054ed1f7337cb5483408ef085348cce685be7752615ca7667c

    • SHA512

      c6fda97135e6c374a2f5f6337593772ce7a463c4a9423b7a269ab98b98588d885fa11331fefbaf8e2c6e6d9f3dd4e3f836045d3d1b59e0fd8bd9728262fc6f67

    • SSDEEP

      3072:77QzuorbyWV0uXiJoLd64+Auk3dORlEMgK:YzuMWWVp3Z64+Auk3dORl4

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks