General
-
Target
RFQ2573664PDF.exe
-
Size
836KB
-
Sample
230505-zq23nsed44
-
MD5
71ec5221a2034695e676cf553ef632e3
-
SHA1
e724930b8c2aed088d4d205ac882197f8b67e462
-
SHA256
746604779bf099b84b5a237bc6e777b10cd9ca0d02e49e136f4856debbb89d65
-
SHA512
068c1cb9b4c552423ea6af41062ea6ccf7ec2a0c4abf4c37427b11d9ec11c95994caef2d786490032c1ab9c90ba8e51896e01f89f8d2e1aa457942d475ae7452
-
SSDEEP
12288:yc/9WflU/9K2tNHlu3elvjE63hjMLsGIWb/yqYHDC92OzfJ/:hylUHtPu3Gl6IAyq/2C
Static task
static1
Behavioral task
behavioral1
Sample
RFQ2573664PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ2573664PDF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.adahavalandirma.com.tr - Port:
587 - Username:
[email protected] - Password:
hTZ5rg4T - Email To:
[email protected]
Targets
-
-
Target
RFQ2573664PDF.exe
-
Size
836KB
-
MD5
71ec5221a2034695e676cf553ef632e3
-
SHA1
e724930b8c2aed088d4d205ac882197f8b67e462
-
SHA256
746604779bf099b84b5a237bc6e777b10cd9ca0d02e49e136f4856debbb89d65
-
SHA512
068c1cb9b4c552423ea6af41062ea6ccf7ec2a0c4abf4c37427b11d9ec11c95994caef2d786490032c1ab9c90ba8e51896e01f89f8d2e1aa457942d475ae7452
-
SSDEEP
12288:yc/9WflU/9K2tNHlu3elvjE63hjMLsGIWb/yqYHDC92OzfJ/:hylUHtPu3Gl6IAyq/2C
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-