General

  • Target

    Swift_202411054785712.exe

  • Size

    1.1MB

  • Sample

    240511-dmw7cshh5z

  • MD5

    aaf2dc8cddf0d1d520a115465d982e85

  • SHA1

    265889f5bbe27be46303371e1debea373582bb72

  • SHA256

    d948ec899810d776263d97504c42d9918b2333b97883599877a5d3c214e863a7

  • SHA512

    5c7ab16ddb87eadac527d7c9071eba96f8238f11b79218b612bfb4fa8a5210407c712099e9be475c27cd9deac053b3d7e75f4e556817016d3453f85b084ff472

  • SSDEEP

    24576:jAHnh+eWsN3skA4RV1Hom2KXMmHakGXGhMHb0/3Yjh5:uh+ZkldoPK8YakM7IYX

Malware Config

Targets

    • Target

      Swift_202411054785712.exe

    • Size

      1.1MB

    • MD5

      aaf2dc8cddf0d1d520a115465d982e85

    • SHA1

      265889f5bbe27be46303371e1debea373582bb72

    • SHA256

      d948ec899810d776263d97504c42d9918b2333b97883599877a5d3c214e863a7

    • SHA512

      5c7ab16ddb87eadac527d7c9071eba96f8238f11b79218b612bfb4fa8a5210407c712099e9be475c27cd9deac053b3d7e75f4e556817016d3453f85b084ff472

    • SSDEEP

      24576:jAHnh+eWsN3skA4RV1Hom2KXMmHakGXGhMHb0/3Yjh5:uh+ZkldoPK8YakM7IYX

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks