General
-
Target
ss.exe
-
Size
1.0MB
-
Sample
240712-grhrbatdmc
-
MD5
ba8f4e01db94f311b3ccf3ffa1374010
-
SHA1
046871f85902bc859834f2da3b6985c46be9a536
-
SHA256
96a1656ba39abe013fe75a41eb52d9b698f723aa7b5f2ba836a8bc3dccb47e2f
-
SHA512
c8b2647ff734457468b9efd351301c868afaa039d4da74c66987475a54e2e42c66ce3b086170087ea33b01310c90fb64c9195b1c9ac665c8b804281e167b80cd
-
SSDEEP
24576:JAHnh+eWsN3skA4RV1Hom2KXMmHaUXydRKPdmT5:Qh+ZkldoPK8YaUXydR8dO
Static task
static1
Behavioral task
behavioral1
Sample
ss.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ss.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
ss.exe
-
Size
1.0MB
-
MD5
ba8f4e01db94f311b3ccf3ffa1374010
-
SHA1
046871f85902bc859834f2da3b6985c46be9a536
-
SHA256
96a1656ba39abe013fe75a41eb52d9b698f723aa7b5f2ba836a8bc3dccb47e2f
-
SHA512
c8b2647ff734457468b9efd351301c868afaa039d4da74c66987475a54e2e42c66ce3b086170087ea33b01310c90fb64c9195b1c9ac665c8b804281e167b80cd
-
SSDEEP
24576:JAHnh+eWsN3skA4RV1Hom2KXMmHaUXydRKPdmT5:Qh+ZkldoPK8YaUXydR8dO
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-