General
-
Target
detail lengkap transaksi.exe
-
Size
1.1MB
-
Sample
230206-eqr79aca57
-
MD5
61fb9f5b2fe2261dc2143ef1c88a52bd
-
SHA1
e1d6bd5e3da2969e5424716bd9acb1c9bfe5bb68
-
SHA256
aa9680b982b96bce1ab425e2b7f18ea951a832a2c18bba1f6880381a7610bf68
-
SHA512
91b78556bff7af21862b7d81384c0c110a76c24ac7fe6d3beb0b26e77fa1a6e6851f4ee64b90a8345b6858810b4f636d679aa3fe76e12967067d828ea332ff5c
-
SSDEEP
24576:iA3QrxN5IC54TWMj+uIemAAk0EyYEMjdYYuA9H:18tgiq+bemA/rEMjdxuAV
Static task
static1
Behavioral task
behavioral1
Sample
detail lengkap transaksi.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
detail lengkap transaksi.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.procorpadvisory.com - Port:
587 - Username:
[email protected] - Password:
U]ln^(=hL+m= - Email To:
[email protected]
Targets
-
-
Target
detail lengkap transaksi.exe
-
Size
1.1MB
-
MD5
61fb9f5b2fe2261dc2143ef1c88a52bd
-
SHA1
e1d6bd5e3da2969e5424716bd9acb1c9bfe5bb68
-
SHA256
aa9680b982b96bce1ab425e2b7f18ea951a832a2c18bba1f6880381a7610bf68
-
SHA512
91b78556bff7af21862b7d81384c0c110a76c24ac7fe6d3beb0b26e77fa1a6e6851f4ee64b90a8345b6858810b4f636d679aa3fe76e12967067d828ea332ff5c
-
SSDEEP
24576:iA3QrxN5IC54TWMj+uIemAAk0EyYEMjdYYuA9H:18tgiq+bemA/rEMjdxuAV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-