General
-
Target
NEW ORDER.exe
-
Size
1011KB
-
Sample
250227-p75j1sxvgt
-
MD5
021a9c197d6af0c640c6860a98c31adc
-
SHA1
f5ca489c236b4ee6dfd6f66a8c423c425db0ea69
-
SHA256
c59cc58233220bfefce324f3412e9a6bcb1ce9ebec5dd77a853b7364d0c1876b
-
SHA512
7e95c9fc23e63e4b113f54eb1bcc0f99f895697fcf60fbcab3f3a11faff0502e5b5f095332d8f05546247ae6c142bd5425d633972fb58418f583cc32a588f3f9
-
SSDEEP
24576:yu6J33O0c+JY5UZ+XC0kGso6FaOpMSm7SkWY:0u0c++OCvkGs9FaOeaY
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.osmahab.com - Port:
587 - Username:
[email protected] - Password:
emailOSMAHAB123456I - Email To:
[email protected]
Targets
-
-
Target
NEW ORDER.exe
-
Size
1011KB
-
MD5
021a9c197d6af0c640c6860a98c31adc
-
SHA1
f5ca489c236b4ee6dfd6f66a8c423c425db0ea69
-
SHA256
c59cc58233220bfefce324f3412e9a6bcb1ce9ebec5dd77a853b7364d0c1876b
-
SHA512
7e95c9fc23e63e4b113f54eb1bcc0f99f895697fcf60fbcab3f3a11faff0502e5b5f095332d8f05546247ae6c142bd5425d633972fb58418f583cc32a588f3f9
-
SSDEEP
24576:yu6J33O0c+JY5UZ+XC0kGso6FaOpMSm7SkWY:0u0c++OCvkGs9FaOeaY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-