General

  • Target

    QUOTATION_APRQTRA031244.z

  • Size

    2.3MB

  • Sample

    240509-lj277sdh57

  • MD5

    e9f8f7da8c47dd4f2559cbbac94a02e7

  • SHA1

    ab842ba8f40d4fe05f55504f9f81e2ae3892928e

  • SHA256

    ea5b66b7ded52682eb5663c416cf1b0e0c6f512e38ace996dcac6982eec082e0

  • SHA512

    5d27fd8cc5b5790f1340dd72236c19d1eb75be3aef449074907603352cbd77f295680f7198ac38c7a6ebac8dedd08ab29537b1b90c5f5bb6cf407a62ff693b03

  • SSDEEP

    49152:YboaZ0w9/lVyEx49z4F7tFb1eTqGm2HCB/Oe4g2/pJFUkAIJ7k3lgNbmA:yoaZ0wV9q03ZeTU6YOLh/Gk17kVgwA

Malware Config

Extracted

Family

agenttesla

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RaFv@tsTUK55@@<<!!

Targets

    • Target

      QUOTATION_APRQTRA031244.z

    • Size

      2.3MB

    • MD5

      e9f8f7da8c47dd4f2559cbbac94a02e7

    • SHA1

      ab842ba8f40d4fe05f55504f9f81e2ae3892928e

    • SHA256

      ea5b66b7ded52682eb5663c416cf1b0e0c6f512e38ace996dcac6982eec082e0

    • SHA512

      5d27fd8cc5b5790f1340dd72236c19d1eb75be3aef449074907603352cbd77f295680f7198ac38c7a6ebac8dedd08ab29537b1b90c5f5bb6cf407a62ff693b03

    • SSDEEP

      49152:YboaZ0w9/lVyEx49z4F7tFb1eTqGm2HCB/Oe4g2/pJFUkAIJ7k3lgNbmA:yoaZ0wV9q03ZeTU6YOLh/Gk17kVgwA

    Score
    3/10
    • Target

      QUOTATION_APRQTRA031244PDF.scr

    • Size

      2.4MB

    • MD5

      8292bb185757c42a2a78f778e84fecb7

    • SHA1

      c14d9db05e71199e6c6e97b84a016e8c048082fc

    • SHA256

      f9642f3129cafa597a61904afabd06a8f85b54c1bfba6c6d3a1a25e43103d67c

    • SHA512

      4759dae21da7236d012a67a7283bcfda67ecd7995b66ae34a7389dc88b794d8ef6702aedaf7dc931f638b1954da794c9ed18bb3803a42d0e91665ca5f7a417c7

    • SSDEEP

      49152:1ZCaq2Vww4p1CzaVLmqFb9l5C7Jo6ZZ5w252njC:1ZCl2rm1CgLl5WZ32m

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks