General

  • Target

    726cd214c481a2d479a955e17b46ca6817ea14b30af2effd59e82d4ad32b7c45

  • Size

    659KB

  • Sample

    240426-bk9cssgf91

  • MD5

    dfae6e795fb7d0437af14eddaef8f17e

  • SHA1

    9f068f8f7acd96915df5210bfa72c6a13f8fc1b3

  • SHA256

    726cd214c481a2d479a955e17b46ca6817ea14b30af2effd59e82d4ad32b7c45

  • SHA512

    cb00748ae280cfd31a267514d286b26dc2d14370e343a428293ff23da52eaa83a56aa7a52363589d5244a85c16a42baf91c2e03878e44a5a827209cb3046479d

  • SSDEEP

    12288:6Q9h0WxnRX/u/j2yt+jnrcArKW/paPNvD20qzYZHgjkzKqC5DZNCPlj2QVn9kVMJ:6Wq0Jyj2c+jnE1VlZcBdv+lj2QHk+6e

Malware Config

Targets

    • Target

      N factura 24-2024068723.exe

    • Size

      694KB

    • MD5

      edce040806b758f70011f54ffb65985c

    • SHA1

      828ebe650830993ea4c2d6ae81913e73380aa16f

    • SHA256

      489684ef7548f0cad3b675655551bbcd476d1b8fedc9411f797ed73ad820c82a

    • SHA512

      842481c671c6ca37bc83131af972c7c8e2f5af27b6e43005d23a9ad49db0283ab814fb232d1e46172fe4d2e85fda38e1aa699182aeb4c752b1e88bb18bcfcfea

    • SSDEEP

      12288:OsHzOUNUSB/o5LsI1uwajJ5yvv1l2WDGqzYjHglSHKqw5DRFC3lZ2QVL9kpMZWFi:xiUmSB/o5d1ubcv5CljY5hrUlZ2Q3ked

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks