General
-
Target
45b86c917ca8bd14d64c4b7afd26c47c65f9a10dd2b0e0a5014d2d4007f0f3c1
-
Size
746KB
-
Sample
240522-cndwqsha75
-
MD5
3255271d080837dc3ca14ca11ce7c4bf
-
SHA1
c06e970934132dbfaa4f499a0d15daf258da9472
-
SHA256
45b86c917ca8bd14d64c4b7afd26c47c65f9a10dd2b0e0a5014d2d4007f0f3c1
-
SHA512
ba51db8aed4454960de4490976ee19cbbfc6c27fa789c1a3f4cde3788e84e6eecf091b8bb18b935a3fb3d5ddd8363a7be04550c659352782b761be046812952f
-
SSDEEP
12288:uzEn6yWn7fcpVZlu/6uHZJkNY8YIion/EK/76WrwZGX+li4bjL:Bn698VVYZ6J/f/EK/76nGX+lt
Static task
static1
Behavioral task
behavioral1
Sample
45b86c917ca8bd14d64c4b7afd26c47c65f9a10dd2b0e0a5014d2d4007f0f3c1.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail
Targets
-
-
Target
45b86c917ca8bd14d64c4b7afd26c47c65f9a10dd2b0e0a5014d2d4007f0f3c1
-
Size
746KB
-
MD5
3255271d080837dc3ca14ca11ce7c4bf
-
SHA1
c06e970934132dbfaa4f499a0d15daf258da9472
-
SHA256
45b86c917ca8bd14d64c4b7afd26c47c65f9a10dd2b0e0a5014d2d4007f0f3c1
-
SHA512
ba51db8aed4454960de4490976ee19cbbfc6c27fa789c1a3f4cde3788e84e6eecf091b8bb18b935a3fb3d5ddd8363a7be04550c659352782b761be046812952f
-
SSDEEP
12288:uzEn6yWn7fcpVZlu/6uHZJkNY8YIion/EK/76WrwZGX+li4bjL:Bn698VVYZ6J/f/EK/76nGX+lt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-