General

  • Target

    8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3

  • Size

    1.1MB

  • Sample

    240508-bqjpbsde45

  • MD5

    06388533c682f59188cf1ffbcdccf2b8

  • SHA1

    07e292076b3864e15ff5f59e8c5716aa1526eba3

  • SHA256

    8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3

  • SHA512

    66af30850a245b50ffaba98a2669129fe7a232a6fb20020b4ca6ec58a1d2024baeeabdab8d8cf64051095907509413be9ceffcea2803a77c8ac8636c65cada13

  • SSDEEP

    12288:GaHTg/Ewz5XzyNLcHu/nweVaeX2JzgskkNJckI1PHS0uBnY+ayxdyY2FCe5:UyNAOfweAPvrJI6GyxdyYg9

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3

    • Size

      1.1MB

    • MD5

      06388533c682f59188cf1ffbcdccf2b8

    • SHA1

      07e292076b3864e15ff5f59e8c5716aa1526eba3

    • SHA256

      8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3

    • SHA512

      66af30850a245b50ffaba98a2669129fe7a232a6fb20020b4ca6ec58a1d2024baeeabdab8d8cf64051095907509413be9ceffcea2803a77c8ac8636c65cada13

    • SSDEEP

      12288:GaHTg/Ewz5XzyNLcHu/nweVaeX2JzgskkNJckI1PHS0uBnY+ayxdyY2FCe5:UyNAOfweAPvrJI6GyxdyYg9

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks