General

  • Target

    RFQ.exe

  • Size

    569KB

  • Sample

    200716-4p1rzxdc4s

  • MD5

    105cc34e0dcb56a0bb61374f2e6eaae6

  • SHA1

    5e9dc5c0907fd3d4d3d3debc923b1715881da818

  • SHA256

    a4d604ac931839ec691dccc2474d80bf2f826693d4ce914a161a484288ebe20a

  • SHA512

    6133b8dc30fd532d585032acf515f49dce624139411a0c1879bd10a582a104743feed8d3c71523360c0e37d4bc5cc3141c7e1f0bc98f141010a7b127a20d6384

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    challenge12345@

Targets

    • Target

      RFQ.exe

    • Size

      569KB

    • MD5

      105cc34e0dcb56a0bb61374f2e6eaae6

    • SHA1

      5e9dc5c0907fd3d4d3d3debc923b1715881da818

    • SHA256

      a4d604ac931839ec691dccc2474d80bf2f826693d4ce914a161a484288ebe20a

    • SHA512

      6133b8dc30fd532d585032acf515f49dce624139411a0c1879bd10a582a104743feed8d3c71523360c0e37d4bc5cc3141c7e1f0bc98f141010a7b127a20d6384

MITRE ATT&CK Enterprise v6

Tasks