General
-
Target
bde10d3efb3aa7bbf7ff31dad8cb3fa87307cc3c4dacae0efba16d6f64c68b7e
-
Size
566KB
-
Sample
240910-e4jg9syckc
-
MD5
0906d6efdd06a7bdc2226544b0c191b7
-
SHA1
986636c73fcd74450f95a991ce7f22be4226e1b9
-
SHA256
bde10d3efb3aa7bbf7ff31dad8cb3fa87307cc3c4dacae0efba16d6f64c68b7e
-
SHA512
78f02188955bd3dfc672b78f7bed6f30b6945396dc4238f46208c68353dd14a60d993a11a59805a87b03c9e9a17de068354144a390d971cf19edbcf23f221204
-
SSDEEP
12288:8O8PZ0K2iKI1+1zH9TL1g9UgVMdXKHEBiyvv+bMvLp+xyHhaQfGU:2aaKI1WkugVwXK+vJt+xyIG
Static task
static1
Behavioral task
behavioral1
Sample
SSR.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SSR.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
SSR.exe
-
Size
1.1MB
-
MD5
8262470201106c492e44503fd3af5355
-
SHA1
3cdc1d37dcb103d4bfb71cf2e7c7c5d5612c4ee1
-
SHA256
f976ee9cd38b7009ebd0c9da228afc4d51f9fb00aba5dd9a53724a1d9c358e38
-
SHA512
ac91962b1397371b732f55f96aaa77353f0dd3ba0e9177d0973b50716904e8f247f0dfb0290fb102fe0c495aa0f1a0084e6c7065fa68b626ed17b28326e0134b
-
SSDEEP
24576:I4lavt0LkLL9IMixoEgeaaPJKjhlDXqnhq9MmCS:fkwkn9IMHeaaRqrcaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-