General
-
Target
60a78ad1eb4c0ed1275809be9bb8bcf13171ec388b57cc5a9883374d01fbb576.rar
-
Size
564KB
-
Sample
241217-dmrlwazkfl
-
MD5
bf1c7134fbb7f05491e26bd92291fd9c
-
SHA1
b1f7881bf9998d7fcf608f6111a8c3ae0379cf21
-
SHA256
60a78ad1eb4c0ed1275809be9bb8bcf13171ec388b57cc5a9883374d01fbb576
-
SHA512
c01a4c76fa5a4e9d24c6cf020a9da11f88992291f9e35fa3a679fbbb72bea06213ec0b9576c8ea2c298d9bed965c1275ab4414874981af0cee0c4556dd5b75aa
-
SSDEEP
12288:HbwiaILHvH9/M+HiFm88gjWpXc9Bu7F1nkb:8XIlMWiFm8Opszb
Static task
static1
Behavioral task
behavioral1
Sample
newrfq.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
newrfq.exe
-
Size
1.1MB
-
MD5
23e78f332a9eb9075cfadb0253b78f94
-
SHA1
d84d6fb209bcd5e11e75577a859a05e3cfc3ade6
-
SHA256
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1
-
SHA512
2445d5ede505a569ceb562b889c4b0ddddd22b651646b95529010069c2d88a3105dcb6f66b3fd19709a2d6e99dee63648ef4401bf77bb8d00e299b2f17a71f8e
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6Fa1AHX+42fXGWY:vu0c++OCvkGs9Fa1AHX0tY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-