General

  • Target

    8a87a45dbcd63ff898d2c7087da7c448a137ff54f894e5b4251bd25801effedf

  • Size

    1.2MB

  • Sample

    240510-cxn33agh75

  • MD5

    1a9eac67f2179d3f75bce5484e27b7db

  • SHA1

    14919c527ba421a21c68ecd2bde083850f5323d6

  • SHA256

    8a87a45dbcd63ff898d2c7087da7c448a137ff54f894e5b4251bd25801effedf

  • SHA512

    f95d211d22e195939a8ed0074b038ed7788b2bf559fd3205c02dc8bd1f009d006e6acddf9ffee7701994c5512997ec56dfb0a06634c4432c818827c093dc63cb

  • SSDEEP

    24576:zRmJkcoQricOIQxiZY1WNsQp7v954uMbyiJWHKAK5:AJZoQrbTFZY1WNsQ99quMbyfqx

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6811787827:AAEr4cj8xrQKX5i6BnPzE4vzpRaL4EziTo4/

Targets

    • Target

      8a87a45dbcd63ff898d2c7087da7c448a137ff54f894e5b4251bd25801effedf

    • Size

      1.2MB

    • MD5

      1a9eac67f2179d3f75bce5484e27b7db

    • SHA1

      14919c527ba421a21c68ecd2bde083850f5323d6

    • SHA256

      8a87a45dbcd63ff898d2c7087da7c448a137ff54f894e5b4251bd25801effedf

    • SHA512

      f95d211d22e195939a8ed0074b038ed7788b2bf559fd3205c02dc8bd1f009d006e6acddf9ffee7701994c5512997ec56dfb0a06634c4432c818827c093dc63cb

    • SSDEEP

      24576:zRmJkcoQricOIQxiZY1WNsQp7v954uMbyiJWHKAK5:AJZoQrbTFZY1WNsQ99quMbyfqx

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks