General

  • Target

    83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2

  • Size

    1011KB

  • Sample

    240308-bsgbzscd3y

  • MD5

    cf1cccbdf2580bc20a5d6c7a8e2f047d

  • SHA1

    2e5cce88fe062e33993daa5cd23856aae93ba7bf

  • SHA256

    83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2

  • SHA512

    e2ce8fd1f1747faa596b18923e41740d32ca96e91e759822bd4050c3222b8f872836120843ade96192ee3efb9f5d18bef7f9a4f7e89800815da22ccf01fe98f3

  • SSDEEP

    24576:mB+ghm5v+KjVvuniHXR4ufQ/rEPNKLmaYEPrZaMR8bR:o+r5unE4tTE1ZaYXM

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    VvMMgD#w!TZmaka!@

Targets

    • Target

      83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2

    • Size

      1011KB

    • MD5

      cf1cccbdf2580bc20a5d6c7a8e2f047d

    • SHA1

      2e5cce88fe062e33993daa5cd23856aae93ba7bf

    • SHA256

      83c0f4886beef85f2c2c9d97a4491330e6c3f9ed7a5b088965fe5eb367cbf8b2

    • SHA512

      e2ce8fd1f1747faa596b18923e41740d32ca96e91e759822bd4050c3222b8f872836120843ade96192ee3efb9f5d18bef7f9a4f7e89800815da22ccf01fe98f3

    • SSDEEP

      24576:mB+ghm5v+KjVvuniHXR4ufQ/rEPNKLmaYEPrZaMR8bR:o+r5unE4tTE1ZaYXM

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks