General
-
Target
kas.exe
-
Size
1.2MB
-
Sample
241002-h8qnxstfmj
-
MD5
911e5ea2603b4a7dc17bf847dda0f6f9
-
SHA1
f2bc99c64bf0aeadc02170f62f32245623e8b862
-
SHA256
d81f1cfc732280d0f92df78433544b467d837f60cbfcfdbff21c5f987eaea942
-
SHA512
37e8d01f0989395aa56e83b5d00a2097761c87522b52baf596c81d56f4f95a7e0a34a6932b161d6a5853a2e094555363d4c3475d145e94558396f954fe620a40
-
SSDEEP
24576:WfmMv6Ckr7Mny5Qb/OM930NCdy500u0cfbdG:W3v+7/5Qb/OEXdp0YG
Static task
static1
Behavioral task
behavioral1
Sample
kas.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
kas.exe
-
Size
1.2MB
-
MD5
911e5ea2603b4a7dc17bf847dda0f6f9
-
SHA1
f2bc99c64bf0aeadc02170f62f32245623e8b862
-
SHA256
d81f1cfc732280d0f92df78433544b467d837f60cbfcfdbff21c5f987eaea942
-
SHA512
37e8d01f0989395aa56e83b5d00a2097761c87522b52baf596c81d56f4f95a7e0a34a6932b161d6a5853a2e094555363d4c3475d145e94558396f954fe620a40
-
SSDEEP
24576:WfmMv6Ckr7Mny5Qb/OM930NCdy500u0cfbdG:W3v+7/5Qb/OEXdp0YG
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-