General
-
Target
9e38ef9a79916333da87a34c96bae3fc52e657af1dc9ea707ba57c023736d6be
-
Size
728KB
-
Sample
241004-cmfnyasgke
-
MD5
2e287291f8380f5e34803554e15095e8
-
SHA1
785098e7bcaf748a7c967137246a05efc4167d63
-
SHA256
9e38ef9a79916333da87a34c96bae3fc52e657af1dc9ea707ba57c023736d6be
-
SHA512
cb471741b29eec4016d8b77fbdc16783323c740b8857422b805dc0d5fe525a3634331e53acb4c2c4b48483449348dded791193b24b9cfca77ea29ad16250128f
-
SSDEEP
12288:Y9zUnhegqsJkQ3fOASKD1T45ljZE1qu9MQqDksgTSWkv10w6fuxwG2hnic1OZgqv:YZUhDqc3fOTEe5lwMQqDkOGw6fux5Qib
Static task
static1
Behavioral task
behavioral1
Sample
veems.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
veems.exe
-
Size
1.1MB
-
MD5
edf46dbf4604538e8960afea7aabcaf3
-
SHA1
97c0968be1c80de8aedc94029e7b7ec1cf509b62
-
SHA256
abfb108ffb2021d7851e2908a6ebf23b507aa2cbf36628f9f30b9eada587de96
-
SHA512
8149edb19759f3a86fbdd0be8732402544b4bbe8edb43e1ed9672c01be476e08052e6afee51403173e25b5a0902c19503dc11bdf031b7d66a88825e64f9ded39
-
SSDEEP
12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5Qb1egC3ExjqtbfwJDjrbGfDdR83dIk/S:WfmMv6Ckr7Mny5Qb11C3ExGfM7KRQWkq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-