General
-
Target
a1045bc7406e2f0cb992d569501278bef67b6e644185b7662de59fafe1b9c377
-
Size
609KB
-
Sample
231212-ccj9dadacj
-
MD5
d756e293c97b13c064ec35d1d5f6c074
-
SHA1
52dda6a5bbcdcb8f531ad17f7c00418b634bcf04
-
SHA256
a1045bc7406e2f0cb992d569501278bef67b6e644185b7662de59fafe1b9c377
-
SHA512
ebb76e610774c7f47bbd600749037793d7735d0aa99989e50959fc1bb986d969c93e4ac4ac78157f8a95aac1f8e3f1c84fdcf56f5e114daae390a9d9d3b61ef0
-
SSDEEP
12288:arvD0V15ImM9D4kGiskPTGlNBu3c5IfpxP1qiSf4rWrRi2NxmJRXEUEf3UfZj+R:aLgVLFM9lYuGlDu3cef7Ajwa9/UbbEfr
Static task
static1
Behavioral task
behavioral1
Sample
CoLYHfsA7mnOFfW.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
CoLYHfsA7mnOFfW.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gianindo.co.id - Port:
587 - Username:
[email protected] - Password:
Ge@753951 - Email To:
[email protected]
Targets
-
-
Target
CoLYHfsA7mnOFfW.exe
-
Size
648KB
-
MD5
8afd8346a60583275b120bcbffb85af2
-
SHA1
872e8a84eda1e1402dc1bfaefd4abdff3475b43f
-
SHA256
ef030162bcf9de1409f69b87233b1ba9d256349773ba623ae4816cc39827c4cf
-
SHA512
eae8fe52465aed2fa69a40c81f6e7682a098a311d9858fb44fccfb639f8cfa339427b1b6ff322265501e694916cd090c9837c90ca11115dd16cd35bee9b1df96
-
SSDEEP
12288:pV3IU8S6eUdCSW+3LpeMgu0C6Nylpace9BbUyo0iWpe/mA:p9ItSAdCSW+3IMguZwcIRyWsuA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-