General

  • Target

    Request For Quotation RFQ1310.exe

  • Size

    823KB

  • Sample

    240428-kxqwnacd4s

  • MD5

    48c4494e4bff82d39ad2ac8173c65bfb

  • SHA1

    1f7fab7375e94b25dd32bc60fc40a76f43ca8862

  • SHA256

    1451b7450f81b2642b3621b32c24b99c72619c4c9c35747b794eb111262cf3a8

  • SHA512

    0cf2a5d4eddab765e7f8b1a0e56bc51a190b92fdc524ce6584ca64e834007260bd1cb3fa3380c5dea25838c1673dc5fac5e7e3879dbdcb51caf70c78cd5dde86

  • SSDEEP

    24576:52PjKr5BNDgk95z+mdcxk3IzWTaKHfhnlMh:kk5BNskumdcK3L//Mh

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      Request For Quotation RFQ1310.exe

    • Size

      823KB

    • MD5

      48c4494e4bff82d39ad2ac8173c65bfb

    • SHA1

      1f7fab7375e94b25dd32bc60fc40a76f43ca8862

    • SHA256

      1451b7450f81b2642b3621b32c24b99c72619c4c9c35747b794eb111262cf3a8

    • SHA512

      0cf2a5d4eddab765e7f8b1a0e56bc51a190b92fdc524ce6584ca64e834007260bd1cb3fa3380c5dea25838c1673dc5fac5e7e3879dbdcb51caf70c78cd5dde86

    • SSDEEP

      24576:52PjKr5BNDgk95z+mdcxk3IzWTaKHfhnlMh:kk5BNskumdcK3L//Mh

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks