General

  • Target

    RFQ(PWCS)000000.exe

  • Size

    544KB

  • Sample

    200716-83gb54m5ce

  • MD5

    aa910773d810f4222dc55005332dcf14

  • SHA1

    12f09afe2fdb57ef52089345e74fd6ad476ff519

  • SHA256

    b0268eefb8ad835c3aeb0fca4d15bb1392952d59b4d8ccfebf070881412e1ec6

  • SHA512

    726a8e2e9bf3a58bb9f8fd4211168d20dd67eb2af631d14ef28e4ed768614d39ca364710fb7d6dcf8c4f307789911122f86b3a746ec739a6ab5e1b19f1fe865f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    challenge12345@

Targets

    • Target

      RFQ(PWCS)000000.exe

    • Size

      544KB

    • MD5

      aa910773d810f4222dc55005332dcf14

    • SHA1

      12f09afe2fdb57ef52089345e74fd6ad476ff519

    • SHA256

      b0268eefb8ad835c3aeb0fca4d15bb1392952d59b4d8ccfebf070881412e1ec6

    • SHA512

      726a8e2e9bf3a58bb9f8fd4211168d20dd67eb2af631d14ef28e4ed768614d39ca364710fb7d6dcf8c4f307789911122f86b3a746ec739a6ab5e1b19f1fe865f

MITRE ATT&CK Enterprise v6

Tasks