General
-
Target
RFQ 130121.exe
-
Size
1.4MB
-
Sample
210113-p2my5zepps
-
MD5
afdb30b55b0afffdafe648f8a2753d57
-
SHA1
f750553e9efdddeb83a05c2d59c8a1570e763b49
-
SHA256
6ff718a9025acbe789514837298147e7b480e74815f7f662775ca96e5503f601
-
SHA512
dbe5a8297c21125fe7f672640c2f0b7182814959bf9be830aba4503c31699c31178c43ebc75fa70b0b4360c55724bcdf445ee6fe157820cfa12e483d45bf7b92
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 130121.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RFQ 130121.exe
Resource
win10v20201028
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1540891786:AAG8-WgKmkT_fgxDGLAT1i1C6rkSbgtmdzE/sendDocument
Targets
-
-
Target
RFQ 130121.exe
-
Size
1.4MB
-
MD5
afdb30b55b0afffdafe648f8a2753d57
-
SHA1
f750553e9efdddeb83a05c2d59c8a1570e763b49
-
SHA256
6ff718a9025acbe789514837298147e7b480e74815f7f662775ca96e5503f601
-
SHA512
dbe5a8297c21125fe7f672640c2f0b7182814959bf9be830aba4503c31699c31178c43ebc75fa70b0b4360c55724bcdf445ee6fe157820cfa12e483d45bf7b92
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-