General

  • Target

    ShippingOrder_ GSHS2400052.exe

  • Size

    185KB

  • Sample

    240420-fejbmshf7v

  • MD5

    5a9bf748b2b3431b39e5a8fea6feaa80

  • SHA1

    08a558eb27295a8e3f70a7a05cf958e2907fd970

  • SHA256

    3801a5a9dd369ed4fefc953437c2059d00da7b98fabd3ec68262ef48f9718bcf

  • SHA512

    caa42a2ea17c2ca98812478dd5739479be6fee0c243401c08003092749b1848b4090b7470f9f6641219b9696cccfecebfc2497e2d7fc8200fb833a13bbe0e022

  • SSDEEP

    3072:fcGYpXxZwveS8lH9YYLI42pVWse3Ns6G2FxgiNCJmPG04:EGYpvwveMYpBRFxgvh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      ShippingOrder_ GSHS2400052.exe

    • Size

      185KB

    • MD5

      5a9bf748b2b3431b39e5a8fea6feaa80

    • SHA1

      08a558eb27295a8e3f70a7a05cf958e2907fd970

    • SHA256

      3801a5a9dd369ed4fefc953437c2059d00da7b98fabd3ec68262ef48f9718bcf

    • SHA512

      caa42a2ea17c2ca98812478dd5739479be6fee0c243401c08003092749b1848b4090b7470f9f6641219b9696cccfecebfc2497e2d7fc8200fb833a13bbe0e022

    • SSDEEP

      3072:fcGYpXxZwveS8lH9YYLI42pVWse3Ns6G2FxgiNCJmPG04:EGYpvwveMYpBRFxgvh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks