General

  • Target

    f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952

  • Size

    664KB

  • Sample

    240514-b8a5xaec8v

  • MD5

    ab7958eb77b1cb9aadfe366da2092027

  • SHA1

    0399ef1e6468abea364ba97fc2ce58a20617b764

  • SHA256

    f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952

  • SHA512

    aae1bffd4c3652d4800e5939c8a19c02e89335353a6ff891a88e3cbaad7db36a99c5e8d64df0f44857ff464cddda05afe971630ab0c92522d9656f8763b77901

  • SSDEEP

    12288:/Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1FTjp7rBHguWJq/GuY4C0qZivK539a5ZP:GhloDX0XOf4X5BxWJq8Cxu9a5Z9WFm

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6706700909:AAF84XSqJERRA6jKqejEqGMhCkiDguB_-5E/

Targets

    • Target

      f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952

    • Size

      664KB

    • MD5

      ab7958eb77b1cb9aadfe366da2092027

    • SHA1

      0399ef1e6468abea364ba97fc2ce58a20617b764

    • SHA256

      f7c0471a702e24c7de7f214a24905704c6783043eab48c4b5a1eb347d846e952

    • SHA512

      aae1bffd4c3652d4800e5939c8a19c02e89335353a6ff891a88e3cbaad7db36a99c5e8d64df0f44857ff464cddda05afe971630ab0c92522d9656f8763b77901

    • SSDEEP

      12288:/Xe9PPlowWX0t6mOQwg1Qd15CcYk0We1FTjp7rBHguWJq/GuY4C0qZivK539a5ZP:GhloDX0XOf4X5BxWJq8Cxu9a5Z9WFm

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks