General

  • Target

    07052024_1245_06052024_Zahlung.rar

  • Size

    628KB

  • Sample

    240507-pza1faah59

  • MD5

    281a3130b5007efb73c62903bd019a79

  • SHA1

    9137a32c3fada218a57fd6d0b10b7369a97bc581

  • SHA256

    63feb24efd7c0d4a1e9b69639187b396e0b61e1338ebf5682102295930dbd2aa

  • SHA512

    d6d6eb57f18767a3a6ffbaf8f0c537a49e27278855e390dffb1dc78831920fbd09a65a4064a36775bb35729b0903ab38d2af686bf1a23a513255ce4d895f3a43

  • SSDEEP

    12288:KRMHcP9RbbxyyeSHpiqeyhj9/GbUaVA0JyEcEC044ow3vkQzA6ZTwFK/:EMHIRb7sqlj9/CV+EcEDhr3cQk612K/

Malware Config

Targets

    • Target

      Zahlung.exe

    • Size

      1.1MB

    • MD5

      2c8875f8ec188a3a1d0bb9ef4ff31af7

    • SHA1

      12b009dceb42263b84f686a03553756c59b146a8

    • SHA256

      102c02a1c8b18891a74d4240cbc6673f2771de86a31c0927c21040676d8c5436

    • SHA512

      8f28a15486ef04a8f8a1143148ba1fe084527020c594246a65ef9d6d339b796f2973c954075b3f4a4325b98f475b1c6b534816502cd28a45c6aae19e9cc3f1a3

    • SSDEEP

      24576:54lavt0LkLL9IMixoEgeaqiaMx5ZdELwWZxMq9MmCS:Ikwkn9IMHeaqiSiaPCS

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks