General
-
Target
148115fb98df21b6153162a4d1f50ff813ebfdea4ffb562547396762687de85c
-
Size
573KB
-
Sample
240912-gvbgeavdlr
-
MD5
4c8ff2307494c3a644d3236a3ba5123f
-
SHA1
84de0d75373168ee55ebe84e4583fcec0d4b9abc
-
SHA256
148115fb98df21b6153162a4d1f50ff813ebfdea4ffb562547396762687de85c
-
SHA512
df59353f671dc75fc994e31a8e045082ec1774beb6c172d5f889b8f85fd46da181b5ed935c9be7c9e7e78fd4abda0bdf4dbebdd6bcf0b0240ce350a285e60362
-
SSDEEP
12288:SjOJllVpxPQ4dgJy8lXSQMkrLISvjw8TCGAKhJG97+xFyutL:D/HpxvmtXS5k/IStlAKhJG9COG
Static task
static1
Behavioral task
behavioral1
Sample
sds.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sds.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
sds.exe
-
Size
1.1MB
-
MD5
7029454946cf4fe34459dd079cd256ba
-
SHA1
c838ab1e7cfd08049ee32de459513c2880d0fdeb
-
SHA256
2d22510dc919c1c9ddd462bb3560f3e2889bd8034acd41388c6e82fcda8fdf64
-
SHA512
48a05c9d748eb9a7eb11b62067b025499e36f3eef43595ac698011e58533f87ad2a273674f939c730becb9df87c999de885e913774cb2c7352ff9583d0a437ff
-
SSDEEP
24576:r4lavt0LkLL9IMixoEgeaXfJUSP9JGhEDwq9MmCS:+kwkn9IMHeaXfjJGhDaPCS
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-