General

  • Target

    638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061

  • Size

    912KB

  • Sample

    240326-btlcbsea91

  • MD5

    eaab63e5c73af2c13c5d18faa1dfc09f

  • SHA1

    edd14b744c5d68efabb0fd4db11c030006818c36

  • SHA256

    638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061

  • SHA512

    d9d837559b311508de7d575fb05a9ef2331ae87683e1fe7545a5523b7871cec7745fba8834593c3ba2557e7fc9df06aa0e9350fe817fff5b91406b6736a8de6f

  • SSDEEP

    12288:lsHzOUNUSB/o5LsI1uwajJ5yvv1l2e7QS3O1wEIprNHzq7g8IdSVe2JWjtKFBG:ciUmSB/o5d1ubcvHQI9VzqPXgtIBG

Malware Config

Targets

    • Target

      638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061

    • Size

      912KB

    • MD5

      eaab63e5c73af2c13c5d18faa1dfc09f

    • SHA1

      edd14b744c5d68efabb0fd4db11c030006818c36

    • SHA256

      638772e0db2d9ff9f16d9f7e0898f0d0c667506fa2b7120b9b7d46b9c4812061

    • SHA512

      d9d837559b311508de7d575fb05a9ef2331ae87683e1fe7545a5523b7871cec7745fba8834593c3ba2557e7fc9df06aa0e9350fe817fff5b91406b6736a8de6f

    • SSDEEP

      12288:lsHzOUNUSB/o5LsI1uwajJ5yvv1l2e7QS3O1wEIprNHzq7g8IdSVe2JWjtKFBG:ciUmSB/o5d1ubcvHQI9VzqPXgtIBG

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks