General
-
Target
RFQ#777800.exe
-
Size
486KB
-
Sample
211021-q76mrabccm
-
MD5
397b20ae26eaccb4ec2ae5e94f6ee0f0
-
SHA1
f49012b7adbfd8113781bf46944e884c1f2ee236
-
SHA256
0269e12654cdeee23a263c2fa347dae7da354dad89e9b618e347f919813cf3f5
-
SHA512
e0a004fefa3c99e7b52cab147352d103e4cd1389d7221df48959e471e9fc5afbbfc91a9bfeb85e7c601d7c731a59a2c3c14e95588d1164cf1cc42b886322e1b3
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#777800.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
RFQ#777800.exe
Resource
win10-en-20210920
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
box5363.bluehost.com - Port:
587 - Username:
[email protected] - Password:
Hajarbh@1993
Targets
-
-
Target
RFQ#777800.exe
-
Size
486KB
-
MD5
397b20ae26eaccb4ec2ae5e94f6ee0f0
-
SHA1
f49012b7adbfd8113781bf46944e884c1f2ee236
-
SHA256
0269e12654cdeee23a263c2fa347dae7da354dad89e9b618e347f919813cf3f5
-
SHA512
e0a004fefa3c99e7b52cab147352d103e4cd1389d7221df48959e471e9fc5afbbfc91a9bfeb85e7c601d7c731a59a2c3c14e95588d1164cf1cc42b886322e1b3
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-