General
-
Target
805d72f539f9893f81fd79199866f0dddcca2d8141664115fe6ce3ab40438fa0
-
Size
390KB
-
Sample
220520-2d99mafbf6
-
MD5
fda08ea79b0e6a6603aafc20df600ea9
-
SHA1
99391cd1b6a3a33073b867ba7f088deeb18613d5
-
SHA256
805d72f539f9893f81fd79199866f0dddcca2d8141664115fe6ce3ab40438fa0
-
SHA512
0d24c1487819b82c0657465fb11e6ee558f4375b00a6560a4a0110f34112d31b6db9bc3d2c87178f534ceb724745a1db5c9ca99c2d6faecc9eff845fd8837c77
Static task
static1
Behavioral task
behavioral1
Sample
RFQ- 6852841-August.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ- 6852841-August.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
rosemary0101
Targets
-
-
Target
RFQ- 6852841-August.exe
-
Size
478KB
-
MD5
6795b074f9f0fb9304775dd496845108
-
SHA1
62d9a80a3a9d567b4047fb48579c0c64e5e849bb
-
SHA256
10278b0bf04f79014abdbfd1d5bbe2eb2c9583b7f2a30e589539e2740bb19d7d
-
SHA512
90dde7022c60e9f19d439045521c5e34ae776ce2e36a078251b0cad7df462a9be57ff5e830bc6d3a3bafc9cd5c72fc135bdcf17131987b8637b7e1357a9f2e70
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-