General
-
Target
30% SWIFT COPY DOWN PAYMENT-PDF.exe
-
Size
1.0MB
-
Sample
241002-grfxqavape
-
MD5
66110becc4f6d2fb92e1de3e628f5dce
-
SHA1
0a05265eea556d81f46173242b760ce2e7b99faa
-
SHA256
7fd0b00c630f29f370623f698cb81c67960f1e7c8b6954c1a5c451fd5e1a4d06
-
SHA512
db1b062d29e243cde4b8c1df9696cf0e79b90b9119e2f1b8d03d91976a99de8bb510057e59d62d44ac29275303c6aa2a2a32296a843749d7a400843de7cf6241
-
SSDEEP
24576:uCdxte/80jYLT3U1jfsWafjLKNCA1WxNs3ZW/baQ:nw80cTsjkWafjeNH1WxNs3i
Static task
static1
Behavioral task
behavioral1
Sample
30% SWIFT COPY DOWN PAYMENT-PDF.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.zqamcx.com - Port:
587 - Username:
[email protected] - Password:
Methodman991 - Email To:
[email protected]
Targets
-
-
Target
30% SWIFT COPY DOWN PAYMENT-PDF.exe
-
Size
1.0MB
-
MD5
66110becc4f6d2fb92e1de3e628f5dce
-
SHA1
0a05265eea556d81f46173242b760ce2e7b99faa
-
SHA256
7fd0b00c630f29f370623f698cb81c67960f1e7c8b6954c1a5c451fd5e1a4d06
-
SHA512
db1b062d29e243cde4b8c1df9696cf0e79b90b9119e2f1b8d03d91976a99de8bb510057e59d62d44ac29275303c6aa2a2a32296a843749d7a400843de7cf6241
-
SSDEEP
24576:uCdxte/80jYLT3U1jfsWafjLKNCA1WxNs3ZW/baQ:nw80cTsjkWafjeNH1WxNs3i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-