General
-
Target
98eb5a8ced69f5206ca98a8ed29e97d79c96d5261a7d79886c2b0c405e8f9e6e
-
Size
624KB
-
Sample
250122-lq4dva1kcn
-
MD5
1dbee1653e60661fffa95771004e5b1e
-
SHA1
997038f6ab95c46451ddc953547c9724fe3df5df
-
SHA256
98eb5a8ced69f5206ca98a8ed29e97d79c96d5261a7d79886c2b0c405e8f9e6e
-
SHA512
462cbab4c81fed59d9520cd48444b6af21cddd1ad9f79d58b761f21b53e1e5faf8a48e2095f65b65b3867316823993020495ad16800ca5af1f1e7c9482b5a9d2
-
SSDEEP
12288:MZBgLxy3f4pZ9fRzyt4v1+IR7QgsrVGF6kWe+LB8ahyc+0A6jGLanCqS1:8BYM3fUZT+t4vH4OvWeQueyW3YanCq+
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9
Targets
-
-
Target
RFQ.exe
-
Size
703KB
-
MD5
d5e2b4134debd3c4b82f7655d093ea99
-
SHA1
46c0d741c6e6891328963ece4ec79275eab8f41f
-
SHA256
5d4c512b103d94b3ee9a4840cfe788eebc9c6ff4e5ce5a38aa47385b97d32987
-
SHA512
542fda72e566a657dd92b927327c91286abbe8cd449a37766c19d0544de9d6574b0112a680dde4da49c1491ce812ae7c233169228dbfead0468f7f8ec49b8ffc
-
SSDEEP
12288:KWa+h3UcyNfye27fJZytevZ6IRNQmsRpSF6CWe+LZ84VyIhlMoD:VNUFNfn2NUtevl6qHWeQmKyA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-