General

  • Target

    549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c

  • Size

    9.4MB

  • Sample

    240430-cffqcshf9z

  • MD5

    7dcbac367f0e14d9edef0d20e2c1f11d

  • SHA1

    c319d4e68dc4c12ce1c4c56d5285b6f605647764

  • SHA256

    549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c

  • SHA512

    454497a5b15f3b2bbff03854e43297f409057f99959423ea7262e2dabd4d12592eb2d6dce2b28406c11a5f642780a52a0a6897b557894ee294cd9c77b2a394b6

  • SSDEEP

    196608:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7EhftMPOUiQm6bEZwj6R6HuMTpul0D7Bkt:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7Y

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c

    • Size

      9.4MB

    • MD5

      7dcbac367f0e14d9edef0d20e2c1f11d

    • SHA1

      c319d4e68dc4c12ce1c4c56d5285b6f605647764

    • SHA256

      549ed35d30e4a67640e3f2d6c6ab4dad953b30ed6fc2db6fa39c00e7cd59135c

    • SHA512

      454497a5b15f3b2bbff03854e43297f409057f99959423ea7262e2dabd4d12592eb2d6dce2b28406c11a5f642780a52a0a6897b557894ee294cd9c77b2a394b6

    • SSDEEP

      196608:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7EhftMPOUiQm6bEZwj6R6HuMTpul0D7Bkt:mIfCgf7qzhAzzyxaTsa8MZywc8JI9F7Y

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks