General
-
Target
Reiven RFQ-04032024.exe
-
Size
95KB
-
Sample
240305-jfs41sae99
-
MD5
8696397420d9ab671ce2c679499232f6
-
SHA1
61a529e48a063233d712ea559e819c62d9dcbf7d
-
SHA256
ce8cd744eba1aba5e0833127c89cc56a047b09638714b3086cb707f6d863b9c0
-
SHA512
d0d7f12c5929e8418920103613ea3d446ca2239ed8f210888bb0d2c6c966368daacebab910d6f2bb6430518ecd7bf2fddbaf2300edea51ac90f5fd36e5ea4187
-
SSDEEP
1536:L0xpxeL928CGyO7mpUlFpKZqdSWfpwy+Cz7bWXgN2pbiPL8V45xEDsDxhDyhNdi2:0ORSO7mpUlFpKC/+gN2pZOxEDsDT2Ti2
Static task
static1
Behavioral task
behavioral1
Sample
Reiven RFQ-04032024.exe
Resource
win7-20240221-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
ReparaHogar2013
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
ReparaHogar2013 - Email To:
[email protected]
Targets
-
-
Target
Reiven RFQ-04032024.exe
-
Size
95KB
-
MD5
8696397420d9ab671ce2c679499232f6
-
SHA1
61a529e48a063233d712ea559e819c62d9dcbf7d
-
SHA256
ce8cd744eba1aba5e0833127c89cc56a047b09638714b3086cb707f6d863b9c0
-
SHA512
d0d7f12c5929e8418920103613ea3d446ca2239ed8f210888bb0d2c6c966368daacebab910d6f2bb6430518ecd7bf2fddbaf2300edea51ac90f5fd36e5ea4187
-
SSDEEP
1536:L0xpxeL928CGyO7mpUlFpKZqdSWfpwy+Cz7bWXgN2pbiPL8V45xEDsDxhDyhNdi2:0ORSO7mpUlFpKC/+gN2pZOxEDsDT2Ti2
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contacts a large (4772) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1