General
-
Target
orders.exe
-
Size
1.1MB
-
Sample
241009-d8vknawbpd
-
MD5
81a4d47fa279d32fae97d0c6e4b995a0
-
SHA1
e0d2ac54f263f2876be5f71bcde5f81ed0c9e851
-
SHA256
57096e3fd5c772fcc15e41227dd297b91b42c65ec5416d1501114438b1e90e54
-
SHA512
ec692f7b1802c2c70d0c165fac6e85e2506f1bdb144be7ac78e3d5d140b75c703c6871ca16618e22fe21abfbf6a5e224351af16f29503acee5497248af02b0e6
-
SSDEEP
24576:WfmMv6Ckr7Mny5Qbal91F1IXdDkqfwIFt:W3v+7/5Qbal91F1lIFt
Static task
static1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
orders.exe
-
Size
1.1MB
-
MD5
81a4d47fa279d32fae97d0c6e4b995a0
-
SHA1
e0d2ac54f263f2876be5f71bcde5f81ed0c9e851
-
SHA256
57096e3fd5c772fcc15e41227dd297b91b42c65ec5416d1501114438b1e90e54
-
SHA512
ec692f7b1802c2c70d0c165fac6e85e2506f1bdb144be7ac78e3d5d140b75c703c6871ca16618e22fe21abfbf6a5e224351af16f29503acee5497248af02b0e6
-
SSDEEP
24576:WfmMv6Ckr7Mny5Qbal91F1IXdDkqfwIFt:W3v+7/5Qbal91F1lIFt
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-