General
-
Target
e7fa73e5814212f5cd1e9bfca0232a5ad5658332653499d0da55b6ad86bbbdd4
-
Size
557KB
-
Sample
241213-bp7d1atpdx
-
MD5
46c0f10344f15874c0ab3d4994327d24
-
SHA1
e2e4045f3e8a74184846cc25af8c77283be8e2d3
-
SHA256
e7fa73e5814212f5cd1e9bfca0232a5ad5658332653499d0da55b6ad86bbbdd4
-
SHA512
7401c9039c5f28a4471e1984d68ca41f533ec71da4da5971ef8a6e1dcccf5364ec6d67f4e77ecbfc8352e92f35f92af8d1c85623d65e7a2d60e43845b6c63435
-
SSDEEP
12288:PNuFpV/v1DaNYU1qW2EYZ8TfZZ3p982bTMH6gsoBvnTz:PMpVFDaNYzX2TtTbYaonTz
Static task
static1
Behavioral task
behavioral1
Sample
mp.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
mp.exe
-
Size
1024KB
-
MD5
808c1ca4955914a3011461749316898f
-
SHA1
db8b9d8e9f8df24fb219482002e3049941cabb43
-
SHA256
c65e44ab50c876191f4c648500e7bf3d6986a7c6941fae19ee55d752aae2e523
-
SHA512
7ce74d8fd5bae9b50a0c7b88b3b4611ce397cca56dc467766ca263fd7ca42dc16cb97f94d49436e164300f3943200087b0db1cb67552521c54fa9bf77efce831
-
SSDEEP
24576:8u6J33O0c+JY5UZ+XC0kGso6FagrHwcxWlg61jSalkGqSWY:mu0c++OCvkGs9FagrHwAWlg6BSaEY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-