General
-
Target
4b6c70eb12ad86ec45007c685623446f62036ffcdf8a0616965dc7dd90f46c97
-
Size
1.4MB
-
Sample
231205-vsemyade56
-
MD5
5e83b64135b00650af29e821b63e1140
-
SHA1
3353f1016b3eff385bb6c9c8322c38b8465030aa
-
SHA256
4b6c70eb12ad86ec45007c685623446f62036ffcdf8a0616965dc7dd90f46c97
-
SHA512
b184c1ba9449b922732c4701a440ce4a2ebf7969263957b44f3cb630ba2b610dc0b0f468aa897448676d7b6acf001b07062af86ebb07adef9d552183e4fd42bc
-
SSDEEP
12288:JWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:K34/up+pJHY9L+lQtsY21KCFfXNXL
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_7993.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
RFQ_7993.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
Protocol: smtp- Host:
webmail.vector-kl.com - Port:
587 - Username:
[email protected] - Password:
IzzaVectorKL202)
Extracted
agenttesla
Protocol: smtp- Host:
webmail.vector-kl.com - Port:
587 - Username:
[email protected] - Password:
IzzaVectorKL202) - Email To:
[email protected]
Targets
-
-
Target
RFQ_7993.EXE
-
Size
827KB
-
MD5
23284d731a5f245ed50c262c6bd783c8
-
SHA1
ec77a6f42091861b7544d611d9b01d5c761c44c8
-
SHA256
cabb6fdf10c577b6d529be65a4e5154dd53e67570d305da21ad39c03f67ce3bb
-
SHA512
e62c33552d5f8e866c8b58a1cc5220c06c653b0dd32f8329b62716e81d2958edd734f4e85903e124db0589ed1bca6d9e695d5337ba80f7162ba14dec53eeec62
-
SSDEEP
12288:YWctW8G34/uK45+po2K6YoTmnCS+TZQnOlEs12xIZkrUHCqDRKRoUaggA+X+neXL:534/up+pJHY9L+lQtsY21KCFfXNXL
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-