General
-
Target
RFQ# 1000735894.exe
-
Size
665KB
-
Sample
240627-hn7rpszeqj
-
MD5
c31d914451c7b7417d6dc961d9554307
-
SHA1
9a6734273004e6fae64fbc46591ddf4253cc094e
-
SHA256
5cd0843b990576cd296b0a64896c77d2fff223e6a5e223110f22ef810666dc93
-
SHA512
8ac5dfe0e59023b8e82f05f02b0ce0dc41b510d0e2ede20bb24420ded826588cfe39b085326c20cf07db68e9acf65c25d95f541df583b62357bda6325bef45ec
-
SSDEEP
12288:YZsBd3657p/8DL+hvxG20RjtU2bNC2+9ojgCAKpS2YQjbEJs4/QmmJgpS7wtO:MsBd36UOhvxG20RJU5V1CAqdYQjbGs46
Static task
static1
Behavioral task
behavioral1
Sample
RFQ# 1000735894.exe
Resource
win7-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.toyotasialkot.com - Port:
587 - Username:
[email protected] - Password:
nXx0bu%7ymS81Jdgt - Email To:
[email protected]
Targets
-
-
Target
RFQ# 1000735894.exe
-
Size
665KB
-
MD5
c31d914451c7b7417d6dc961d9554307
-
SHA1
9a6734273004e6fae64fbc46591ddf4253cc094e
-
SHA256
5cd0843b990576cd296b0a64896c77d2fff223e6a5e223110f22ef810666dc93
-
SHA512
8ac5dfe0e59023b8e82f05f02b0ce0dc41b510d0e2ede20bb24420ded826588cfe39b085326c20cf07db68e9acf65c25d95f541df583b62357bda6325bef45ec
-
SSDEEP
12288:YZsBd3657p/8DL+hvxG20RjtU2bNC2+9ojgCAKpS2YQjbEJs4/QmmJgpS7wtO:MsBd36UOhvxG20RJU5V1CAqdYQjbGs46
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-