General
-
Target
IMG18.12.24.pdf.rar
-
Size
591KB
-
Sample
241218-gxledswpgt
-
MD5
615b96a40531244daf6b07243406ca0e
-
SHA1
30426de1f7ca7bb5c9f62fde4b3e6860992c4ed7
-
SHA256
46fa9da80e40bcd770af060a7264de128159d7dd6aa0cdb1247222b9a489b89d
-
SHA512
6c8516e1d6d1f955bb3f885095144b5ccdd8965a89374a65da74f6ecb2317f1e49ed879a452f4f90bd3f35bf9312a94137c113fb0a3871553d6dcf4590084189
-
SSDEEP
12288:p5kBXUf8Krrvle85Sgbtys+M051RksGUwW1RBx8MTmFX7uAS6K7L8dJfU:p5kpOr0gSzs3WLf/x8Wmhz3C47fU
Static task
static1
Behavioral task
behavioral1
Sample
ssd.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
ssd.exe
-
Size
1.1MB
-
MD5
25faaf0547ddfa428eebeb9f294a543d
-
SHA1
ce2e4895d420c6b978242a599c0ab342f91766cb
-
SHA256
c620d711c48043d706ee5bc200e6087db4b9d46b854ad8d8eb8ba47c9c770662
-
SHA512
1fb8cfeeb80a05b205aa5c9e8251a8492f1d54bdd8ae819e9aac459bb5b809da6064d0de27ffc6ee8aa360318676eccdf8282198ac8c9065eb3d7be6a24d72f7
-
SSDEEP
24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8aHXzSMGaqMlHB7:YTvC/MTQYxsWR7aH5Gaq
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-