General
-
Target
RFQ102922-RFQSharjah Oman Engineering llc.scr.exe
-
Size
368KB
-
Sample
221121-wt3xlafd7t
-
MD5
d41ab848116dc5ef660ecab86d3f2eba
-
SHA1
d1ee44d027e5d23cb09b7869f6df3df517906cff
-
SHA256
ab0a87ce5b49af8387b69e87ce50fec40769bbead62005ca2c6969321ab31f1e
-
SHA512
4951923dd0a48e8757f1fc1507b0f11f901add90c95df65ed07e6ee3f0e654b111368c3a41fe904b925eacb26763571d27e45bcfa2e079cc6f04d05bc421a40d
-
SSDEEP
6144:1Ea0+IRp74gy5yWp94iwIvkYoczdWTnovZp/Zncp6/dJ5dD2Rep/77yjZ:JIn7Zy5yQ69WYcxti8dD2cp/77UZ
Static task
static1
Behavioral task
behavioral1
Sample
RFQ102922-RFQSharjah Oman Engineering llc.scr.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ102922-RFQSharjah Oman Engineering llc.scr.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5472075572:AAH72ryjgTKG52VYCqF2mpPaWaPLe7C91tE/
Targets
-
-
Target
RFQ102922-RFQSharjah Oman Engineering llc.scr.exe
-
Size
368KB
-
MD5
d41ab848116dc5ef660ecab86d3f2eba
-
SHA1
d1ee44d027e5d23cb09b7869f6df3df517906cff
-
SHA256
ab0a87ce5b49af8387b69e87ce50fec40769bbead62005ca2c6969321ab31f1e
-
SHA512
4951923dd0a48e8757f1fc1507b0f11f901add90c95df65ed07e6ee3f0e654b111368c3a41fe904b925eacb26763571d27e45bcfa2e079cc6f04d05bc421a40d
-
SSDEEP
6144:1Ea0+IRp74gy5yWp94iwIvkYoczdWTnovZp/Zncp6/dJ5dD2Rep/77yjZ:JIn7Zy5yQ69WYcxti8dD2cp/77UZ
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-