General
-
Target
Order enquiry 2025.exe
-
Size
1.2MB
-
Sample
240924-p74ygswarr
-
MD5
99d60ef6caf5a18402bb86921dea79a4
-
SHA1
a72a402f680e4865472327f50d420c90ac2331fb
-
SHA256
a60bf25d5fe0114b515c2989851b95ca25e1fd474f83b640fac77bba2b80834a
-
SHA512
f18ff81d20795916f0ec1588c6faf1d5a9f6a9659520676a589f1258224b8e35c490006aae45253afe30adbf263db6108f10616258f1fa4c9dec56783d30aeac
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCpAKm5rZx1Ql3jhOoRU/oTahB:7JZoQrbTFZY1iaCpAKm5lxs3jhOoRcoq
Static task
static1
Behavioral task
behavioral1
Sample
Order enquiry 2025.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Order enquiry 2025.exe
-
Size
1.2MB
-
MD5
99d60ef6caf5a18402bb86921dea79a4
-
SHA1
a72a402f680e4865472327f50d420c90ac2331fb
-
SHA256
a60bf25d5fe0114b515c2989851b95ca25e1fd474f83b640fac77bba2b80834a
-
SHA512
f18ff81d20795916f0ec1588c6faf1d5a9f6a9659520676a589f1258224b8e35c490006aae45253afe30adbf263db6108f10616258f1fa4c9dec56783d30aeac
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCpAKm5rZx1Ql3jhOoRU/oTahB:7JZoQrbTFZY1iaCpAKm5lxs3jhOoRcoq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-