General
-
Target
RFQ.exe
-
Size
569KB
-
Sample
200716-4p1rzxdc4s
-
MD5
105cc34e0dcb56a0bb61374f2e6eaae6
-
SHA1
5e9dc5c0907fd3d4d3d3debc923b1715881da818
-
SHA256
a4d604ac931839ec691dccc2474d80bf2f826693d4ce914a161a484288ebe20a
-
SHA512
6133b8dc30fd532d585032acf515f49dce624139411a0c1879bd10a582a104743feed8d3c71523360c0e37d4bc5cc3141c7e1f0bc98f141010a7b127a20d6384
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
challenge12345@
Targets
-
-
Target
RFQ.exe
-
Size
569KB
-
MD5
105cc34e0dcb56a0bb61374f2e6eaae6
-
SHA1
5e9dc5c0907fd3d4d3d3debc923b1715881da818
-
SHA256
a4d604ac931839ec691dccc2474d80bf2f826693d4ce914a161a484288ebe20a
-
SHA512
6133b8dc30fd532d585032acf515f49dce624139411a0c1879bd10a582a104743feed8d3c71523360c0e37d4bc5cc3141c7e1f0bc98f141010a7b127a20d6384
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-