General

  • Target

    f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806.exe

  • Size

    696KB

  • Sample

    240424-cg8sjaea9z

  • MD5

    a875dd426f1b15376aa51698921ae9be

  • SHA1

    f36bb04b6ccbfbb2a5de912bf970eaf247108eac

  • SHA256

    f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806

  • SHA512

    fa1d2a9b305d7856d1ef72c0b654583534b731a2be0bdac050e17a06c6d4c13c1e5a4dcae3551ea98809bd0ed32ff7ba8eca0f1a771a611371884cf68fe57be2

  • SSDEEP

    12288:XsHzOUNUSB/o5LsI1uwajJ5yvv1l280AQ9Xe1J4OlDEiMsmwrdjxETEbCNP:GiUmSB/o5d1ubcv3XQt+JZlDEiGwdOEO

Malware Config

Targets

    • Target

      f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806.exe

    • Size

      696KB

    • MD5

      a875dd426f1b15376aa51698921ae9be

    • SHA1

      f36bb04b6ccbfbb2a5de912bf970eaf247108eac

    • SHA256

      f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806

    • SHA512

      fa1d2a9b305d7856d1ef72c0b654583534b731a2be0bdac050e17a06c6d4c13c1e5a4dcae3551ea98809bd0ed32ff7ba8eca0f1a771a611371884cf68fe57be2

    • SSDEEP

      12288:XsHzOUNUSB/o5LsI1uwajJ5yvv1l280AQ9Xe1J4OlDEiMsmwrdjxETEbCNP:GiUmSB/o5d1ubcv3XQt+JZlDEiGwdOEO

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks