General
-
Target
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1.exe
-
Size
1.1MB
-
Sample
241217-e5vlxs1jcy
-
MD5
23e78f332a9eb9075cfadb0253b78f94
-
SHA1
d84d6fb209bcd5e11e75577a859a05e3cfc3ade6
-
SHA256
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1
-
SHA512
2445d5ede505a569ceb562b889c4b0ddddd22b651646b95529010069c2d88a3105dcb6f66b3fd19709a2d6e99dee63648ef4401bf77bb8d00e299b2f17a71f8e
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6Fa1AHX+42fXGWY:vu0c++OCvkGs9Fa1AHX0tY
Static task
static1
Behavioral task
behavioral1
Sample
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1.exe
-
Size
1.1MB
-
MD5
23e78f332a9eb9075cfadb0253b78f94
-
SHA1
d84d6fb209bcd5e11e75577a859a05e3cfc3ade6
-
SHA256
c64cd755a3b9d9bc23e8b0654820c719556cd630198bd3ba147e5dda26474ea1
-
SHA512
2445d5ede505a569ceb562b889c4b0ddddd22b651646b95529010069c2d88a3105dcb6f66b3fd19709a2d6e99dee63648ef4401bf77bb8d00e299b2f17a71f8e
-
SSDEEP
24576:du6J33O0c+JY5UZ+XC0kGso6Fa1AHX+42fXGWY:vu0c++OCvkGs9Fa1AHX0tY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-