General
-
Target
RFQ10675000162.exe
-
Size
4.6MB
-
Sample
240515-rzp6gadg6y
-
MD5
bdac6ecf5c7f3ae57414eb01e643f96b
-
SHA1
a931d7d7b4471c39e37c14369373aa0bc4d5ad2e
-
SHA256
50e845d9eb8b8a08f77da69556c94958265cb875129a41177c60094b71434e9a
-
SHA512
9a021ae8bf9bb33a7055224bc50a7206bc16fc2358299b52b31837c106195eec4c1695260307a7a95c919d3fd9cb21c28112ed3c9f9c51490191ee0b4159a27e
-
SSDEEP
24576:0s99lUjIm5M193TxVmMJIquuX/GQl04NCYIHesng/pMqRG+5LF2DfE8z4jJsP+i4:b
Static task
static1
Behavioral task
behavioral1
Sample
RFQ10675000162.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
RFQ10675000162.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
d9GOyTceXsMT - Email To:
[email protected]
Targets
-
-
Target
RFQ10675000162.exe
-
Size
4.6MB
-
MD5
bdac6ecf5c7f3ae57414eb01e643f96b
-
SHA1
a931d7d7b4471c39e37c14369373aa0bc4d5ad2e
-
SHA256
50e845d9eb8b8a08f77da69556c94958265cb875129a41177c60094b71434e9a
-
SHA512
9a021ae8bf9bb33a7055224bc50a7206bc16fc2358299b52b31837c106195eec4c1695260307a7a95c919d3fd9cb21c28112ed3c9f9c51490191ee0b4159a27e
-
SSDEEP
24576:0s99lUjIm5M193TxVmMJIquuX/GQl04NCYIHesng/pMqRG+5LF2DfE8z4jJsP+i4:b
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-