General
-
Target
bac229d28544292d41b53ddc974a7444.bin
-
Size
600KB
-
Sample
231121-dcnggacd3s
-
MD5
acff319b07f54d34d0bae5b6a6f8e855
-
SHA1
ee49852355f18ddab7de29e68231afa5e05e3523
-
SHA256
59563758446c6fb081d2ed6fff0e9686704b8bca204358fe600a7c2e51f8e545
-
SHA512
4c1b012a059554b2d38237a661a97ef3d95d0bcc97ba8d42a7de5d9372f5f6915f890cf5753be38b04cfed71b5ee42eefd52e48007b77b5abb9e4924b956d199
-
SSDEEP
12288:Ni6U0ormedQzK0lkmtGS7hy+WFkD12XE4pE9k7E1gye8l7FrCGhvHbfwlQA:NfoFziGS7hyByD1v4K/GQ1XDfoQA
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
boys@opttools-tw.com - Password:
kV$bSqJ1 daniel - Email To:
boys@opttools-tw.com
Targets
-
-
Target
RFQ.exe
-
Size
728KB
-
MD5
2a62b3b50dc20a361eaa8956ca312a81
-
SHA1
835dce3de7679964b51f14c1d7efeac5e795fbf5
-
SHA256
4fb354ecdf9b230311b7b6bc60b1016f5f17653a1653e1c6fa1fbbbc92a08a30
-
SHA512
1356c26448e0f1ddd68e8e0b5c4bce21cf26454f15a87e493b47c15b682e9af915d09c465d68a826dc0f5cf5d6d931e135fe312624f4ede011f69212e9bbdd08
-
SSDEEP
12288:oXkNp2iNkuPF33L1BL4yE8M37kEGMj9WHpP92tMRdIrHVTlcZxB8Dbya24vA:fp1l5b1et8iGMj9WJPIMRUVT6ZU44v
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-