General

  • Target

    2cc218a62d049d31355e7976c899c8dc1054a6adfc82ab27497b08f780644f83.exe

  • Size

    2.8MB

  • Sample

    240329-clbctsfd53

  • MD5

    f676b2e399bb66aff93ea75e288cc77a

  • SHA1

    c070d9d7f4209197a1de3863d3931c793de2f600

  • SHA256

    2cc218a62d049d31355e7976c899c8dc1054a6adfc82ab27497b08f780644f83

  • SHA512

    15cc02ba0f93ab14812afc32b9ce1f4a6f8183a2a519286b4bdd79e25be3e6b55f9439e9e739d313794d2df35a7783c9caf742ccb5f5a7c7a500463debf9afcb

  • SSDEEP

    49152:6hIFVTE9ox8jJbzMM8HBKTRyjylyT0naL374neHJwZ/nK:2IKghKNgsywa77bHJwtn

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      2cc218a62d049d31355e7976c899c8dc1054a6adfc82ab27497b08f780644f83.exe

    • Size

      2.8MB

    • MD5

      f676b2e399bb66aff93ea75e288cc77a

    • SHA1

      c070d9d7f4209197a1de3863d3931c793de2f600

    • SHA256

      2cc218a62d049d31355e7976c899c8dc1054a6adfc82ab27497b08f780644f83

    • SHA512

      15cc02ba0f93ab14812afc32b9ce1f4a6f8183a2a519286b4bdd79e25be3e6b55f9439e9e739d313794d2df35a7783c9caf742ccb5f5a7c7a500463debf9afcb

    • SSDEEP

      49152:6hIFVTE9ox8jJbzMM8HBKTRyjylyT0naL374neHJwZ/nK:2IKghKNgsywa77bHJwtn

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks