General
-
Target
08102024_1549_08102024_IMG001.PO27.WA00001.PDF.rar
-
Size
717KB
-
Sample
241008-tc2bbsxeme
-
MD5
3771549614c2c11e64cdd244625b72e1
-
SHA1
fb3e6bd7f503cc7fa8ba5d0afb839cf6f41052a3
-
SHA256
34bc9531be9d9969e29b515b479f14a61e15178f5ffd665e26f793f31936f6da
-
SHA512
ac6d3e3056f862bb10b5bb335e4e317773d1139731dc89ed3fc905fa285a4f2a4feb9eb415656d9b1290a8ee803703489176ff181c950bc58ccabb99d82113b7
-
SSDEEP
12288:O9zUnhegqsJkQ3fOASKD1T45luvjRcrlzITObwGFQ5gwwkKI4QXhFngAYKx8:OZUhDqc3fOTEe5lydc1ITLWEXLgfP
Static task
static1
Behavioral task
behavioral1
Sample
pm2.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
pm2.exe
-
Size
1.1MB
-
MD5
8a816ce3f12808d0a10967a2826a8ab1
-
SHA1
ff236c23fe4c72709c20c21d12d88a1b06054706
-
SHA256
2c5f3b264077552dd3c8d666603e7b5c6eaed19d980812568b737ce6d3d7930f
-
SHA512
1018ecfafd6ef2e605c57486a4e73288f6f63ef5c19b2b354d861f2dcc1091a685127cdd85afc2b0c28a045c4fd4ddafde0c2e28a0234bd6724ec432c88baa5f
-
SSDEEP
24576:WfmMv6Ckr7Mny5QbLxPtkCD5fGU9iEhr9:W3v+7/5QbLhFgKr9
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-