General
-
Target
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a
-
Size
652KB
-
Sample
240427-bykxcshb6x
-
MD5
6d7798805db34d8c1dcc0321613c3410
-
SHA1
e69a5cc833d2311316d9b5878f547d89d7184b0b
-
SHA256
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a
-
SHA512
40985368f31a7083a71184e066475291322c6651c224976325467a5668e7c884ad7c285d4c6a531d8132fb7c58040fe5483d90032e994ad8a4dda9963dc5cf90
-
SSDEEP
12288:zarUF9WMbbUs/dN28/r+uQJ9wsQXohP6qhPqrFzy3UytGzrI6tOeD6RZ:erU2M8s/d1T+uQ4EbhL3Zyli
Static task
static1
Behavioral task
behavioral1
Sample
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs
Targets
-
-
Target
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a
-
Size
652KB
-
MD5
6d7798805db34d8c1dcc0321613c3410
-
SHA1
e69a5cc833d2311316d9b5878f547d89d7184b0b
-
SHA256
8ceb3808dfe2433dddcde779deac4ac58a595175e09d1c8b6a47dbf7f327d16a
-
SHA512
40985368f31a7083a71184e066475291322c6651c224976325467a5668e7c884ad7c285d4c6a531d8132fb7c58040fe5483d90032e994ad8a4dda9963dc5cf90
-
SSDEEP
12288:zarUF9WMbbUs/dN28/r+uQJ9wsQXohP6qhPqrFzy3UytGzrI6tOeD6RZ:erU2M8s/d1T+uQ4EbhL3Zyli
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-