General
-
Target
1169446616a4ee3924ccf9155964f6291d97645af930a92a82a9a87d3ccaf7c1
-
Size
606KB
-
Sample
220520-2nmw3sffe8
-
MD5
7deb71ef9fbed393e2918b2af3586cf9
-
SHA1
c2636b126e3bfecc9cc00ed52c862c924c594b15
-
SHA256
1169446616a4ee3924ccf9155964f6291d97645af930a92a82a9a87d3ccaf7c1
-
SHA512
3581b5dae3e85035cf004d7ac845bd731b31d3c233f47c2051fceb63477300eaba47a9329ab786101777fe214f98aeac3409de2dc97d8c10ccdf1d68846d5554
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.4414_122.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ.4414_122.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mehatinfo.com - Port:
587 - Username:
[email protected] - Password:
V}muUc4yRa]R
Targets
-
-
Target
RFQ.4414_122.exe
-
Size
634KB
-
MD5
d026d6d25bfd7f106f6acf63cdbece03
-
SHA1
b2c3509de0049d6172b45a8639d27ea996f347e8
-
SHA256
77682fb2cd5b31c9c8f45afa66b50e52f0f55e37a66bd6efe0ebdf10fb52b5e0
-
SHA512
92cc03e52d269865d6cbdeb94fd55e7107de9e240622023ce6775533c14d5321a16d60ea4104394a23fbf45a212e91c1ff5664aba99f2945bb15d1ddc913e34a
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-