General
-
Target
purchase order.uue.zip
-
Size
717KB
-
Sample
250423-mlp64avwhw
-
MD5
859308a3d94ece5c8b879401ef037556
-
SHA1
59a16438b332f10e5cbf02a85815d3dfffd41e2b
-
SHA256
8d9e65885b51afc2ef67f51c28e8a046b2fa956641eb63d800405c49cb7bfda1
-
SHA512
15da5dc163320450a92c6b30916a90cb05827db6adcb59395ed1cf658f87f643cf5e37f2423f52d6c5c66ffd5a12c3cdf3a98bac57a025b85b78a45be452c245
-
SSDEEP
12288:xIPE6R+rcHjklF8qMqF8mfBPvHqyMABx7M/mwk0+AKnnOIyuwj9E92O+:/zgDklFyqxfZPrM+JMuwk0+BtwJ5
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
QBD{3zf.F+2F - Email To:
[email protected]
Targets
-
-
Target
purchase order.exe
-
Size
100.0MB
-
MD5
ca7f5a6447e31f1ca518f968ea04d9f5
-
SHA1
0a680a6ff416a7e9b465a179ef15d3a2595bb887
-
SHA256
dccd8d4e643ac26e1af810b405f481c93bbfd18a11c553d2d1a3e32cfeb82f7c
-
SHA512
31f5cc2edf167117dcb77f2ec7c894631dfa9ff2d75f53f4219503c064f6a552950b4dbd9b9815c8c183f175ba1fc6fda3df0c65ff4dc4e66bb393db234e574f
-
SSDEEP
24576:Wu6J33O0c+JY5UZ+XC0kGso6FaGEuwk0+NxwXC+WY:4u0c++OCvkGs9FaGEuhxkWY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-