General
-
Target
Uqzqkjvjt.exe
-
Size
667KB
-
Sample
231211-jw4wfshcbm
-
MD5
d840d8828c7d653df6e528c5839c58e1
-
SHA1
2200c0209a437889afe3b268301fdfc467b70fd7
-
SHA256
4a27c12a8f4fb92e14521406e64dee16c6e888ba8de479b56d273241f514883b
-
SHA512
1fa04c5285db39fd177d6e5498d5af7e60bfb3446d9b756acfeed0d86121dd0e037feed483362a2a790e63a4559b073231147c4f974603be959327c286a6b608
-
SSDEEP
12288:8JCwrKHetRgFqSFa7y0iL/M8GXem/rZcsMW2g7dyEL3uG5:aCJH3PTtD0/dclW20d+
Static task
static1
Behavioral task
behavioral1
Sample
Uqzqkjvjt.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Uqzqkjvjt.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@ - Email To:
[email protected]
Targets
-
-
Target
Uqzqkjvjt.exe
-
Size
667KB
-
MD5
d840d8828c7d653df6e528c5839c58e1
-
SHA1
2200c0209a437889afe3b268301fdfc467b70fd7
-
SHA256
4a27c12a8f4fb92e14521406e64dee16c6e888ba8de479b56d273241f514883b
-
SHA512
1fa04c5285db39fd177d6e5498d5af7e60bfb3446d9b756acfeed0d86121dd0e037feed483362a2a790e63a4559b073231147c4f974603be959327c286a6b608
-
SSDEEP
12288:8JCwrKHetRgFqSFa7y0iL/M8GXem/rZcsMW2g7dyEL3uG5:aCJH3PTtD0/dclW20d+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-