General
-
Target
WZAgent.exe
-
Size
24.3MB
-
Sample
240521-smkkwsac3t
-
MD5
2812e3412cdfde43d093addd686f7541
-
SHA1
6044220194e89f9e4054ae049708aa364f4a2557
-
SHA256
fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff
-
SHA512
8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9
-
SSDEEP
393216:T/2gRyBpa4UEQ7mMzVR0/p/I3Eqg8OqnYTOWxhXNPQfLtCwzIuDSMivX:TupzUEQ7mkVR0RI/OqnYtdPY9SxvX
Malware Config
Targets
-
-
Target
WZAgent.exe
-
Size
24.3MB
-
MD5
2812e3412cdfde43d093addd686f7541
-
SHA1
6044220194e89f9e4054ae049708aa364f4a2557
-
SHA256
fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff
-
SHA512
8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9
-
SSDEEP
393216:T/2gRyBpa4UEQ7mMzVR0/p/I3Eqg8OqnYTOWxhXNPQfLtCwzIuDSMivX:TupzUEQ7mkVR0RI/OqnYtdPY9SxvX
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-