General
-
Target
RFQ 071.23 020.23.exe
-
Size
779KB
-
Sample
230330-jldxaada9x
-
MD5
bc1fac98c09af837959226f91f6d54c1
-
SHA1
5257b8498fb0df2e06259fa49a6b333f34603944
-
SHA256
1897da9314bfab3a6feaae55d4e82fa4f764c04593c9aedfc4fde0f7e7f7a2dd
-
SHA512
107d3f67e05e46f788c64bcaa3fa7b506a0b0ae4e1907116d0915fb9721fdae5b1bb48ca46a73b14b506909b3a6a06193578425043fb0f16591654b1dfbcb468
-
SSDEEP
24576:jCVZ9BW+n+6AbaGZwMhK5Uu399i/Ml7R5:G3EK+fbbZveUuNP7
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 071.23 020.23.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ 071.23 020.23.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
N!hfzy$8
Targets
-
-
Target
RFQ 071.23 020.23.exe
-
Size
779KB
-
MD5
bc1fac98c09af837959226f91f6d54c1
-
SHA1
5257b8498fb0df2e06259fa49a6b333f34603944
-
SHA256
1897da9314bfab3a6feaae55d4e82fa4f764c04593c9aedfc4fde0f7e7f7a2dd
-
SHA512
107d3f67e05e46f788c64bcaa3fa7b506a0b0ae4e1907116d0915fb9721fdae5b1bb48ca46a73b14b506909b3a6a06193578425043fb0f16591654b1dfbcb468
-
SSDEEP
24576:jCVZ9BW+n+6AbaGZwMhK5Uu399i/Ml7R5:G3EK+fbbZveUuNP7
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-