General
-
Target
RFQ(PWCS)000000.exe
-
Size
544KB
-
Sample
200716-83gb54m5ce
-
MD5
aa910773d810f4222dc55005332dcf14
-
SHA1
12f09afe2fdb57ef52089345e74fd6ad476ff519
-
SHA256
b0268eefb8ad835c3aeb0fca4d15bb1392952d59b4d8ccfebf070881412e1ec6
-
SHA512
726a8e2e9bf3a58bb9f8fd4211168d20dd67eb2af631d14ef28e4ed768614d39ca364710fb7d6dcf8c4f307789911122f86b3a746ec739a6ab5e1b19f1fe865f
Static task
static1
Behavioral task
behavioral1
Sample
RFQ(PWCS)000000.exe
Resource
win7
Behavioral task
behavioral2
Sample
RFQ(PWCS)000000.exe
Resource
win10v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
challenge12345@
Targets
-
-
Target
RFQ(PWCS)000000.exe
-
Size
544KB
-
MD5
aa910773d810f4222dc55005332dcf14
-
SHA1
12f09afe2fdb57ef52089345e74fd6ad476ff519
-
SHA256
b0268eefb8ad835c3aeb0fca4d15bb1392952d59b4d8ccfebf070881412e1ec6
-
SHA512
726a8e2e9bf3a58bb9f8fd4211168d20dd67eb2af631d14ef28e4ed768614d39ca364710fb7d6dcf8c4f307789911122f86b3a746ec739a6ab5e1b19f1fe865f
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-