General

  • Target

    adc841d38be354f28fc97ef5d6e34ab3307a3e4f16f95273ed16e024b9b62e60

  • Size

    2.8MB

  • Sample

    240329-a9p5sadg64

  • MD5

    8feb98fc0f895e1b48b0ffe0ee4c6e79

  • SHA1

    6ddeb864c5e13403d9fb99c8ca128a18996e4b4d

  • SHA256

    adc841d38be354f28fc97ef5d6e34ab3307a3e4f16f95273ed16e024b9b62e60

  • SHA512

    2f9f0662e385ddcaf8ee74070adf2be231d202c46aacc36145fb1402a57edb09ee62a3524d582fafeec6aa17c77ecacd8dcd3f9d8151e67255543b76fb9e8393

  • SSDEEP

    49152:icgp00ZjGLj1+hDYmSPpaEhTiA80ulVn0A:AqLj1+FYEJ2A

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    minors@aoqiinflatables.com
  • Password:
    RaFv@tsTUK55@@<<!!
  • Email To:
    sendtop@qlststv.com

Targets

    • Target

      adc841d38be354f28fc97ef5d6e34ab3307a3e4f16f95273ed16e024b9b62e60

    • Size

      2.8MB

    • MD5

      8feb98fc0f895e1b48b0ffe0ee4c6e79

    • SHA1

      6ddeb864c5e13403d9fb99c8ca128a18996e4b4d

    • SHA256

      adc841d38be354f28fc97ef5d6e34ab3307a3e4f16f95273ed16e024b9b62e60

    • SHA512

      2f9f0662e385ddcaf8ee74070adf2be231d202c46aacc36145fb1402a57edb09ee62a3524d582fafeec6aa17c77ecacd8dcd3f9d8151e67255543b76fb9e8393

    • SSDEEP

      49152:icgp00ZjGLj1+hDYmSPpaEhTiA80ulVn0A:AqLj1+FYEJ2A

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks