General
-
Target
3fe8b2554fe48bdc2e197082760e18c681f251dea9d8b9c5aea037b3774e974c
-
Size
556KB
-
Sample
241211-bmqcpsykhv
-
MD5
4badc112c9f806aa0320cf2913f8429f
-
SHA1
d2efbb35c0d204574c349f3e077f48a0211dc4e9
-
SHA256
3fe8b2554fe48bdc2e197082760e18c681f251dea9d8b9c5aea037b3774e974c
-
SHA512
48cc36320cc748d9738e20080e35c9f231907855f91ecf2bed725a04e0cb32bba66a38d33210a8a2956d14aacb6904462f24dad7da27e5d92364bbe894c1c236
-
SSDEEP
12288:afflRCmII3V0ossaMZhg0gvvnohCL4WqBTsfS0pZ1YpGcyaHiGle79MkLIa:arDrTss/QnuCL4W/msGle7ekL1
Static task
static1
Behavioral task
behavioral1
Sample
PO NO1492024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO NO1492024.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
c_V]g4Z*O.;% - Email To:
[email protected]
Targets
-
-
Target
PO NO1492024.exe
-
Size
1.0MB
-
MD5
07ac7514d2c3a5a9d6767fadb6c07ebd
-
SHA1
f52186bc5236db7a15eb49e38ed5d8fa8e5e45bc
-
SHA256
31c81dacc488b878b2f13297e0f8d7f2ad677adb681e6d5629953a4442b768fc
-
SHA512
d0724f0f6ef2e984c1b3634262108e6b6390394db3907e370adf9668017301fd4db6c0f42e0d9753fbb014688859a9b128e665474bbf3d7b217863ac11141b6d
-
SSDEEP
24576:Fu6J33O0c+JY5UZ+XC0kGso6FaTEmGQoQsvEJWY:Hu0c++OCvkGs9FaTEvQmvVY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-