General

  • Target

    0bb66b41da5a7981c6c67c17420a5f8c3768e573b31f05730bd760fe68f521a0

  • Size

    2.3MB

  • Sample

    240330-bnsjfsee67

  • MD5

    4aa390c30dcb11183aa8904cdf1950cd

  • SHA1

    315a4f69ac1e76120a7db18a7b755ccbc62d164c

  • SHA256

    0bb66b41da5a7981c6c67c17420a5f8c3768e573b31f05730bd760fe68f521a0

  • SHA512

    5ee63ccbcc7fb87348fb8a71de1ad28247517272e30faf52d37246c8cceba7139255f055dffb2c040e27bee79a3df44fefdef21463197963c38cdfd5a84db3c7

  • SSDEEP

    49152:yogDE97S0dxvV2/qTjKNNdEaFVO0zJD1o/9:BZQ0jvkqTjKNHEaFJD1M

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      0bb66b41da5a7981c6c67c17420a5f8c3768e573b31f05730bd760fe68f521a0

    • Size

      2.3MB

    • MD5

      4aa390c30dcb11183aa8904cdf1950cd

    • SHA1

      315a4f69ac1e76120a7db18a7b755ccbc62d164c

    • SHA256

      0bb66b41da5a7981c6c67c17420a5f8c3768e573b31f05730bd760fe68f521a0

    • SHA512

      5ee63ccbcc7fb87348fb8a71de1ad28247517272e30faf52d37246c8cceba7139255f055dffb2c040e27bee79a3df44fefdef21463197963c38cdfd5a84db3c7

    • SSDEEP

      49152:yogDE97S0dxvV2/qTjKNNdEaFVO0zJD1o/9:BZQ0jvkqTjKNHEaFJD1M

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks