General
-
Target
QUOTE 77700XXXXX023.img
-
Size
718KB
-
Sample
231211-rltazaghgk
-
MD5
d461afe9ebb6b728cb163b0c8e52aa40
-
SHA1
c025ede81df2bbe37286e5cb281c748ce484a4a8
-
SHA256
0efa252ce7d31beceed0a8e7479a32acedf886ecf2f6fb98e7edb19fa8895d0f
-
SHA512
9733b20fb7f102a1324e321aa56be0bb8c70d4a01d86e7dfd94cbec54c52d2689a056eb0802294835e6bfc8e44457f88f85977218053448299282f1c7b93190c
-
SSDEEP
12288:AJCwrKHetRgFqSFa7y0iL/M8GXem/rZcsMW2g7dyEL3uG5:WCJH3PTtD0/dclW20d+
Static task
static1
Behavioral task
behavioral1
Sample
Uqzqkjvjt.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
Uqzqkjvjt.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@ - Email To:
[email protected]
Targets
-
-
Target
Uqzqkjvjt.exe
-
Size
667KB
-
MD5
d840d8828c7d653df6e528c5839c58e1
-
SHA1
2200c0209a437889afe3b268301fdfc467b70fd7
-
SHA256
4a27c12a8f4fb92e14521406e64dee16c6e888ba8de479b56d273241f514883b
-
SHA512
1fa04c5285db39fd177d6e5498d5af7e60bfb3446d9b756acfeed0d86121dd0e037feed483362a2a790e63a4559b073231147c4f974603be959327c286a6b608
-
SSDEEP
12288:8JCwrKHetRgFqSFa7y0iL/M8GXem/rZcsMW2g7dyEL3uG5:aCJH3PTtD0/dclW20d+
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-