General
-
Target
veems.exe
-
Size
1.1MB
-
Sample
241004-ajbjpstgqj
-
MD5
edf46dbf4604538e8960afea7aabcaf3
-
SHA1
97c0968be1c80de8aedc94029e7b7ec1cf509b62
-
SHA256
abfb108ffb2021d7851e2908a6ebf23b507aa2cbf36628f9f30b9eada587de96
-
SHA512
8149edb19759f3a86fbdd0be8732402544b4bbe8edb43e1ed9672c01be476e08052e6afee51403173e25b5a0902c19503dc11bdf031b7d66a88825e64f9ded39
-
SSDEEP
12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5Qb1egC3ExjqtbfwJDjrbGfDdR83dIk/S:WfmMv6Ckr7Mny5Qb11C3ExGfM7KRQWkq
Static task
static1
Behavioral task
behavioral1
Sample
veems.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
veems.exe
-
Size
1.1MB
-
MD5
edf46dbf4604538e8960afea7aabcaf3
-
SHA1
97c0968be1c80de8aedc94029e7b7ec1cf509b62
-
SHA256
abfb108ffb2021d7851e2908a6ebf23b507aa2cbf36628f9f30b9eada587de96
-
SHA512
8149edb19759f3a86fbdd0be8732402544b4bbe8edb43e1ed9672c01be476e08052e6afee51403173e25b5a0902c19503dc11bdf031b7d66a88825e64f9ded39
-
SSDEEP
12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5Qb1egC3ExjqtbfwJDjrbGfDdR83dIk/S:WfmMv6Ckr7Mny5Qb11C3ExGfM7KRQWkq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-