General

  • Target

    ff28bc5da16feadf7f4a6f94ca684b84afafc3da4d62e8154c01d7070041ce74

  • Size

    736KB

  • Sample

    240514-bjzrzadf52

  • MD5

    ee5bfa79dec689da7504296b4fe000cc

  • SHA1

    28c87b4616e2b23edbae41ae30f4ef90cd35c1c5

  • SHA256

    ff28bc5da16feadf7f4a6f94ca684b84afafc3da4d62e8154c01d7070041ce74

  • SHA512

    78275e6683cd40ca1ac1ee7602270c2a8838f61dc5e6c8df576711a494e473bc2f7c09b7303847e0111cdf05eb682e8a73a202da54c4240752de51908d51d6ca

  • SSDEEP

    12288:/wZynYJYKRbhM5ZmhClxkIXW4EqGIwaoBIaRggG17nWjpqaF5kLu49czxIjeS/bc:/RYJXRWrmh4xkIXbEqGIjoBrRgg6nWl5

Malware Config

Targets

    • Target

      Factura2205590821.exe

    • Size

      1.1MB

    • MD5

      63b2c81131687e687e3e7f1c0deb12c8

    • SHA1

      2465347106a89ada6ede41f6ee6f89f3979621a0

    • SHA256

      a609b506672dd6a2da8bd25c0ae4d21688c2ed48c1c205366e6a8c3a323e6671

    • SHA512

      20765196191da86142c415f54f948ab9ec84b2e24d991e81a185d6d5cc3ba77ed6ffa6655e8e927cac73d9ce30b55b1e21565701dbeec91a64fbd9f553cbc3e1

    • SSDEEP

      24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHal2gcNWtf8QL4vd5:gh+ZkldoPK8Yal2pWtf7L4/

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks