General
-
Target
c490fa448da4d8da4dd98e781162eb915dda066ba1bc08bd301fc3bc3f98e888
-
Size
384KB
-
Sample
220520-2wb5jsgba5
-
MD5
f4d1126e290f638f94cdc4baa2a1b288
-
SHA1
7dce98e8835a2ead3e49565bf2c5a15532123be5
-
SHA256
c490fa448da4d8da4dd98e781162eb915dda066ba1bc08bd301fc3bc3f98e888
-
SHA512
a30a009042054d87231607866914fb626d91c86ab2c4e9020a4bb1d733840a497961c80137f5decd34300a550ec36d7f50aeb2baf556da86a89da7035ed9830c
Static task
static1
Behavioral task
behavioral1
Sample
RFQ1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ1.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
@jaffinmarknma@344
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
@jaffinmarknma@344
Targets
-
-
Target
RFQ1.exe
-
Size
439KB
-
MD5
ff2bd7b477cf94aae1392840d4e2bbf8
-
SHA1
1c4fbec12640050cccc4f1267bfa6879331c9fad
-
SHA256
2b23bd3f75f21fca9811b646ade99f92cbd26e4892c1f8079716d1925797edb3
-
SHA512
08f4d115ae82ee970e1d816d897dd4a96765b0154aa12661298be7840a18a74b834925b465d19f80d3be7c52bbb40d78c89cebff63822a9d3f6ef71cbafa57df
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-