General

  • Target

    ba5dec80ddb7fb6cfc43338a8c6a490c03008bcf98fe0490cf4a47e9dbe378b6

  • Size

    666KB

  • Sample

    240427-b36dvsgd76

  • MD5

    c1a3206c075a192e436e78faecb543d7

  • SHA1

    9547e0dcabdce224f8204aa97d5dcb41d9ab59a0

  • SHA256

    ba5dec80ddb7fb6cfc43338a8c6a490c03008bcf98fe0490cf4a47e9dbe378b6

  • SHA512

    c014d8f09c6bdd799b3b17b5b57dcf6c7ca0df23747943ba67e07d09aaad0daa0c2836f618c55d7b161f8777fb6155c56e39e6bc7add0204396a5e88382a8865

  • SSDEEP

    12288:1J8o7zzRTC/1uBnQexqxwwfS9GE0dFJl+LuQf0jlsmrTmXMi7MiteiyF3P6LCBNB:38szz0NuBzxOv24J8u3oX7M6gF3PCCEI

Malware Config

Targets

    • Target

      N factura 24-2024068723.exe

    • Size

      702KB

    • MD5

      73cf576f8b9052985b473488a5b4816a

    • SHA1

      75aeec0ab7a8cd10e487df65a988d1b9b13475a3

    • SHA256

      180896df7dc93c43d3da245c9f40c20f10902bc4d1a8b38386ec1ce185e71123

    • SHA512

      d911fd9efb3611b450a646cb3979ba5f8ae682ce9e2e96296cdf4ecdbf5aa618d9094cd4c2312d961c507294e7e9e9bd4568c15ee1161c9e34409c1cc22e191d

    • SSDEEP

      12288:msHzOUNUSB/o5LsI1uwajJ5yvv1l2RjmrLmxGi7qidkiKz3PeLk/NYZC6Nhe:JiUmSB/o5d1ubcvGxFqAmz3PmkGk6Nhe

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks