General

  • Target

    a875dd426f1b15376aa51698921ae9be.bin

  • Size

    661KB

  • Sample

    240425-cclr7sdc22

  • MD5

    440e919ff237398948f2dece7307d7c1

  • SHA1

    0aa6e877da33c52fc0a1b210e1fa11fda7c1e66e

  • SHA256

    0d6a9032aa5cc7a2bca9031d137c77353f80a2f184369700b62fd614ba5518c5

  • SHA512

    5c3a8c86b2005673c117235d9b0acadeab37e165e04c4d7fccbc5179ce51d422765f54a35c1d18571edef872dc6e108b84a9bad1cf8a7a10c17e3b04a0b42678

  • SSDEEP

    12288:fxSgWqxK7FBPisDPC2fk805jThjnJXVPBCSSY/pFlDncjFYUOKsU+eot6a4A0oCC:8gWqCmsDPINlFjnJvCBWp7DnFUOcqtFH

Malware Config

Targets

    • Target

      f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806.exe

    • Size

      696KB

    • MD5

      a875dd426f1b15376aa51698921ae9be

    • SHA1

      f36bb04b6ccbfbb2a5de912bf970eaf247108eac

    • SHA256

      f8dccc6cb76c461ef6d1623050e3d3121acaa5d0467fb013c44fa422d4d65806

    • SHA512

      fa1d2a9b305d7856d1ef72c0b654583534b731a2be0bdac050e17a06c6d4c13c1e5a4dcae3551ea98809bd0ed32ff7ba8eca0f1a771a611371884cf68fe57be2

    • SSDEEP

      12288:XsHzOUNUSB/o5LsI1uwajJ5yvv1l280AQ9Xe1J4OlDEiMsmwrdjxETEbCNP:GiUmSB/o5d1ubcv3XQt+JZlDEiGwdOEO

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks