General

  • Target

    7b9478937e9d635385759c04e273f802bd5fe8ff93d26fca91b26d85363e5cfc.rar

  • Size

    649KB

  • Sample

    240511-bx9t4adf9v

  • MD5

    86761523233b88ca7164bd18f1b9ddd6

  • SHA1

    6786a09e5afbb8f3e0ae1546a667d6c97d50a6b4

  • SHA256

    7b9478937e9d635385759c04e273f802bd5fe8ff93d26fca91b26d85363e5cfc

  • SHA512

    a210aff071992852d773920677974702ba728204cc31230348136f55b7e32a3ca69ba99adade35930d5199985afbde4bd1048f7d8fc2724e7a6139d046c05173

  • SSDEEP

    12288:Xnb1yOS3FwMn71K1eqDWc6Z+xtZtJw0almaJ1nTBwrSWbOIQhuhb6WAildRl24:XRy732MBi3D5zz/7aTntwrSWiWBnRl24

Malware Config

Targets

    • Target

      PO-33423122765.exe

    • Size

      1.3MB

    • MD5

      bb078c83338aa40005dcc903e8d00842

    • SHA1

      99516fbbfc72156970db12059d52a9d2f16aff5b

    • SHA256

      0ae05a66eb5e6dd6fc26a59f27d48f3cd28ae6c1454082045a32aff02d87c854

    • SHA512

      5b56402c626a92237d1e0a11e6c9034b1632fda921eb5c6fc0389b44e1f4c6eaa0318d0fa0ec2d5be8221c240d98d754bd275a9097f6bd592d3626af0d199e4e

    • SSDEEP

      24576:y4lavt0LkLL9IMixoEgeadMxjIuN6RimoUayq9MmCS:lkwkn9IMHeadAjCCU1aPCS

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detect packed .NET executables. Mostly AgentTeslaV4.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables referencing Windows vault credential objects. Observed in infostealers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables referencing many file transfer clients. Observed in information stealers

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks