General
-
Target
62f9f582c8f654f391ff4ab3c7d6cbe2cb8cae1d0d65fec09e1395d4de39d6d3
-
Size
616KB
-
Sample
250402-wzlkhatqy7
-
MD5
4f08687bbc236a33a8384f9a9b268c39
-
SHA1
b3e66042d30b7044d542a7565016fa11933ece63
-
SHA256
62f9f582c8f654f391ff4ab3c7d6cbe2cb8cae1d0d65fec09e1395d4de39d6d3
-
SHA512
24bace7fa4fd9f244384d4b645e17c123e2ab46cd8982581749041e58186dd37b21e739e62d3151e348d07c85940117ea090e34c4d50dd32b77c140372c1e752
-
SSDEEP
12288:p4FIPZ72TQ9GEF5QyyQi/9zDUj2V9+mUNL3MLQGLW5MK6m0cE4yx:pl72TQ0EvJi1zDUK7U8uMKudx
Static task
static1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
QBD{3zf.F+2F - Email To:
[email protected]
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
1.0MB
-
MD5
b733e88c43bdb2ce44016a797ddeb3af
-
SHA1
cf54e118b5050231ff2587f21621eb5b9d3529f1
-
SHA256
2bd8f998b7d5f9b412cf615494043d492257763a718df3fc122cae1172505290
-
SHA512
41279ddf73c6eca6977dadd609ee94c42842ea1d3fec0dca8090e7d8e5b7a4aa48df68f6ae2659ecbc1fd0c561db3f76981078fffa5a5585c78407a7ca9edf78
-
SSDEEP
24576:Su6J33O0c+JY5UZ+XC0kGso6Fa2GMeMmCKUWY:Uu0c++OCvkGs9Fa2BeWQY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-