General
-
Target
f0d2d9da576153363d789d0751124594a9edf52ea54f0078ff71ce0b827cba44
-
Size
1.4MB
-
Sample
220520-154eqaefg2
-
MD5
df306dc724272277ca50ad5d7bd81540
-
SHA1
c88fd9d533fadfcce37829cabfa70a40a6b687ec
-
SHA256
f0d2d9da576153363d789d0751124594a9edf52ea54f0078ff71ce0b827cba44
-
SHA512
394e0c7e803173f4666b9c8c50f1306858136be7ffd92f630369b7eb47c1bbcbcea002f8b83b1146a89b279481cfeac47ebbb931832b656759bba9958d037fef
Static task
static1
Behavioral task
behavioral1
Sample
ADNOC_RF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ADNOC_RF.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.strongpetrochem-com.me - Port:
587 - Username:
[email protected] - Password:
yUyud*b3
Targets
-
-
Target
ADNOC_RF.EXE
-
Size
863KB
-
MD5
1a1c7ecdc0709500ecafc8ae4d19fb40
-
SHA1
4c81c3090c1e88a448abc65e72f33498209337c5
-
SHA256
f6d6d792db19cd7c5e9bc9178a59c5cbfdc15890b1c1dfaa5087a02d344ada13
-
SHA512
8a1ddea7fb3313f778d9be223d2ba361d93cbf174ed522024f9b8ffa3f91a29450fa18bee47ba11d3b9e92c1d5f992fa68e15e6d575c5eaff688f58343b2c971
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-