General
-
Target
4b53a882fc87d037002401e58db022d2d9436c4e591b9f8b6817286267074295
-
Size
393KB
-
Sample
220712-mcqq9sgfb6
-
MD5
40ee0db5c87d78a3afa486b5b5dfd9a0
-
SHA1
3b1c5069569a07db40c1eadcdb406ee6a8cb2868
-
SHA256
4b53a882fc87d037002401e58db022d2d9436c4e591b9f8b6817286267074295
-
SHA512
3fca4e97bdf38d726bb8ab1692a92613e15c6e3c7a22e8bcb18c6448585b14209d19878475719c096f16ce569f1cdf383bc72e6830126ba309677a1f5bcb30bb
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cpworldindia.com - Port:
587 - Username:
import.cs@ahd.cpworldindia.com - Password:
imprtcs@2019
Extracted
Protocol: smtp- Host:
mail.cpworldindia.com - Port:
587 - Username:
import.cs@ahd.cpworldindia.com - Password:
imprtcs@2019
Targets
-
-
Target
RFQ.exe
-
Size
414KB
-
MD5
8cf823ee0766126638d33918383ca5d8
-
SHA1
3b215b084b9ff049a860fc29108f62c4b6d2133b
-
SHA256
6de7efc9e04cb4db0acc603a7ed700b186d0545acd0e8e84a1d8cce668202dc8
-
SHA512
41cd0278ebb15faddd178fb826e8dc74021980f09b94ff785b1b6d88d5504c2e7b37450484666fd7a00e3c3e865459ace696c41ad84e4d0630d1ef893e93ed94
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
AgentTesla payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Command and Control
Credential Access
Credentials in Files
3Defense Evasion
Modify Registry
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Scheduled Task
1Privilege Escalation