General
-
Target
5826969d9d2f6c339ef93b67693faf161e976311a6f951864aa7f5c7fb15e6de
-
Size
756KB
-
Sample
241007-cfzhgataja
-
MD5
390408328ac41f2cf4759d8acff50ea0
-
SHA1
d327f93ff191b961126216753ecc02fdd671c6b4
-
SHA256
5826969d9d2f6c339ef93b67693faf161e976311a6f951864aa7f5c7fb15e6de
-
SHA512
9c324e9b403907d961da5a319534b5e351fecdce75aec68fe61ae718cff0c9e710fcb12de814fa2cdf753c1e52a91325142a56c71dbace39e69256f0b37a7358
-
SSDEEP
12288:B9zUnhegqsJkQ3fOASKD1T45l4RXrfCSWwkw0setYJaSmWxH0NQ+E7E2odKHelIt:BZUhDqc3fOTEe5lQr7WZw0ssKGNQ+n2N
Static task
static1
Behavioral task
behavioral1
Sample
inv. outstand.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
inv. outstand.exe
-
Size
1.1MB
-
MD5
a5119234440dadd893b250ab5f3c2900
-
SHA1
c5e5d7080e57dbd0e577e6b43e7fdaf04362877e
-
SHA256
450cbaf3ba2178d2ecde3158710066ad71a7d1b17130f29bac92b3414679d46c
-
SHA512
acb65d602a6d4dba63b12a551268081eca401190cb1bd1c876668cb30a5fcbc4ed6d7445efef4dac438f0a03cfd938ccddca4943e2b3b886b773cb25844f2c12
-
SSDEEP
12288:ALkcoxg7v3qnC11ErwIhh0F4qwUgUny5QbWhsTCaoo1cSkQbb1Wkp1GyprPlMFug:WfmMv6Ckr7Mny5QbX4o6uHMU17pouMfD
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-