General
-
Target
purchase order.exe
-
Size
1.0MB
-
Sample
250423-mlp64avwhv
-
MD5
a5d625905ef938b188124593e4e33098
-
SHA1
1f927ceb833e2ddc89c7a7ebf899efb32d620f0d
-
SHA256
f96b903145d941aae3fee86ef42db651e59814f36968076283d09e5080720961
-
SHA512
35aa3654cc56ec267cbf0c38b96056fee2e4f409202fe4420138d933002678dbdec5300ed706660e0e793c2aa3dcadfa644896879fd921a946d587a9ffbcfdb9
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaGEuwk0+NxwXC+WY:4u0c++OCvkGs9FaGEuhxkWY
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
QBD{3zf.F+2F - Email To:
[email protected]
Targets
-
-
Target
purchase order.exe
-
Size
1.0MB
-
MD5
a5d625905ef938b188124593e4e33098
-
SHA1
1f927ceb833e2ddc89c7a7ebf899efb32d620f0d
-
SHA256
f96b903145d941aae3fee86ef42db651e59814f36968076283d09e5080720961
-
SHA512
35aa3654cc56ec267cbf0c38b96056fee2e4f409202fe4420138d933002678dbdec5300ed706660e0e793c2aa3dcadfa644896879fd921a946d587a9ffbcfdb9
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaGEuwk0+NxwXC+WY:4u0c++OCvkGs9FaGEuhxkWY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-