General

  • Target

    a22b502cc5b1476fef59963f2df2eaea9086e775923d82308cecac83d5c5cbcd.exe

  • Size

    243KB

  • Sample

    240424-b48wdadh43

  • MD5

    715a6e943fbaf2e9205a70e391d0fd1c

  • SHA1

    acc6f23393b146fc1c815b06c322280ac27d50ba

  • SHA256

    a22b502cc5b1476fef59963f2df2eaea9086e775923d82308cecac83d5c5cbcd

  • SHA512

    fba1ea4fac8d347f91de299a31fb23e45bacc1826110a5074a33e37907293921965d5a4ae5441b3817a0bbc88d66d93bda87050b4ad5ffe7e77e8ec3c22d169b

  • SSDEEP

    6144:UE08tYLyZZEXrdm4Vz0RpppppppppppppppppppppppppppppbF:U9Xrdm4Vz0Rppppppppppppppppppppz

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      a22b502cc5b1476fef59963f2df2eaea9086e775923d82308cecac83d5c5cbcd.exe

    • Size

      243KB

    • MD5

      715a6e943fbaf2e9205a70e391d0fd1c

    • SHA1

      acc6f23393b146fc1c815b06c322280ac27d50ba

    • SHA256

      a22b502cc5b1476fef59963f2df2eaea9086e775923d82308cecac83d5c5cbcd

    • SHA512

      fba1ea4fac8d347f91de299a31fb23e45bacc1826110a5074a33e37907293921965d5a4ae5441b3817a0bbc88d66d93bda87050b4ad5ffe7e77e8ec3c22d169b

    • SSDEEP

      6144:UE08tYLyZZEXrdm4Vz0RpppppppppppppppppppppppppppppbF:U9Xrdm4Vz0Rppppppppppppppppppppz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks