General

  • Target

    DHL 04410921 PDF.exe

  • Size

    687KB

  • Sample

    240319-keqg6seh44

  • MD5

    e78c1dbf5a60565752827b9da8be8f7c

  • SHA1

    4a12a76c1156ba36a5ba6c71d861d9fb6d67b625

  • SHA256

    68f921d55e5ebbc383106e2de957dfd3a9db76117d8baeaf60d824954e4c3dd4

  • SHA512

    83e1c643808598d18ab70b46322c6809f4c08bbe2ad2459674bb5c0d48ecc42251ccda9b2b169be576299c2598633fdd8c07b54c4f7cfccb087be9c72af6ffca

  • SSDEEP

    12288:MYV6MorX7qzuC3QHO9FQVHPF51jgcSpMQQpDkzgsp6YTzV+nvZSDaK4Tc0jNu:rBXu9HGaVHS2JDHY8vwaK4TNc

Malware Config

Targets

    • Target

      DHL 04410921 PDF.exe

    • Size

      687KB

    • MD5

      e78c1dbf5a60565752827b9da8be8f7c

    • SHA1

      4a12a76c1156ba36a5ba6c71d861d9fb6d67b625

    • SHA256

      68f921d55e5ebbc383106e2de957dfd3a9db76117d8baeaf60d824954e4c3dd4

    • SHA512

      83e1c643808598d18ab70b46322c6809f4c08bbe2ad2459674bb5c0d48ecc42251ccda9b2b169be576299c2598633fdd8c07b54c4f7cfccb087be9c72af6ffca

    • SSDEEP

      12288:MYV6MorX7qzuC3QHO9FQVHPF51jgcSpMQQpDkzgsp6YTzV+nvZSDaK4Tc0jNu:rBXu9HGaVHS2JDHY8vwaK4TNc

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks