General
-
Target
b17505955e2436a83dcc3b4a213f10fc2b827316ba2d40a5d6c2415feb34e623
-
Size
1.0MB
-
Sample
241212-ljmgraskcm
-
MD5
de47cbd3f8a1db46ec2716b4185fab98
-
SHA1
45aecf9f8e6c34207a8dafecd0f2ca90b334c5fe
-
SHA256
b17505955e2436a83dcc3b4a213f10fc2b827316ba2d40a5d6c2415feb34e623
-
SHA512
aba99fdaeb7fc98c187a8a614b678b42f3b1c893244f706622d556d2530c98a4276c36fcb8d4e6d121acfab1aef5794d27a27ff8b9be8f55c24aebd1cd1356ad
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6Fadr9DgdcwAgvpfUvWY:Ru0c++OCvkGs9Fadr/OpjY
Static task
static1
Behavioral task
behavioral1
Sample
b17505955e2436a83dcc3b4a213f10fc2b827316ba2d40a5d6c2415feb34e623.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
b17505955e2436a83dcc3b4a213f10fc2b827316ba2d40a5d6c2415feb34e623
-
Size
1.0MB
-
MD5
de47cbd3f8a1db46ec2716b4185fab98
-
SHA1
45aecf9f8e6c34207a8dafecd0f2ca90b334c5fe
-
SHA256
b17505955e2436a83dcc3b4a213f10fc2b827316ba2d40a5d6c2415feb34e623
-
SHA512
aba99fdaeb7fc98c187a8a614b678b42f3b1c893244f706622d556d2530c98a4276c36fcb8d4e6d121acfab1aef5794d27a27ff8b9be8f55c24aebd1cd1356ad
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6Fadr9DgdcwAgvpfUvWY:Ru0c++OCvkGs9Fadr/OpjY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-