General
-
Target
purchase order.exe
-
Size
100.0MB
-
Sample
250423-k1hdpatsfv
-
MD5
ca7f5a6447e31f1ca518f968ea04d9f5
-
SHA1
0a680a6ff416a7e9b465a179ef15d3a2595bb887
-
SHA256
dccd8d4e643ac26e1af810b405f481c93bbfd18a11c553d2d1a3e32cfeb82f7c
-
SHA512
31f5cc2edf167117dcb77f2ec7c894631dfa9ff2d75f53f4219503c064f6a552950b4dbd9b9815c8c183f175ba1fc6fda3df0c65ff4dc4e66bb393db234e574f
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaGEuwk0+NxwXC+WY:4u0c++OCvkGs9FaGEuhxkWY
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
QBD{3zf.F+2F - Email To:
[email protected]
Targets
-
-
Target
purchase order.exe
-
Size
100.0MB
-
MD5
ca7f5a6447e31f1ca518f968ea04d9f5
-
SHA1
0a680a6ff416a7e9b465a179ef15d3a2595bb887
-
SHA256
dccd8d4e643ac26e1af810b405f481c93bbfd18a11c553d2d1a3e32cfeb82f7c
-
SHA512
31f5cc2edf167117dcb77f2ec7c894631dfa9ff2d75f53f4219503c064f6a552950b4dbd9b9815c8c183f175ba1fc6fda3df0c65ff4dc4e66bb393db234e574f
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaGEuwk0+NxwXC+WY:4u0c++OCvkGs9FaGEuhxkWY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-