General
-
Target
7a7316d2e5ce8a747d3dbf78f36bb9030379c0213c61fed19c362a665666bbf9
-
Size
572KB
-
Sample
241230-bez7yasnbt
-
MD5
78c4a3985c73b676542d5764f549b21d
-
SHA1
8fc707d5617a29ac4cf77a54f5d8a1816964467b
-
SHA256
7a7316d2e5ce8a747d3dbf78f36bb9030379c0213c61fed19c362a665666bbf9
-
SHA512
87df667309c1f6b4c1ce3ce5adef5c30ef9e8fa3c2821773a5273e476ea9b25a2046e62c5be73473428d4ce84e23114742665f6fab871c64b4f50c66f11bddb9
-
SSDEEP
12288:T8G5wgS6fAJLI+ERhZsvL9Q9uPq/e27K4w6w3NH2PP+uxdz:T8YBS6CQMZQ8y/e27K4w6mEPP+Qdz
Static task
static1
Behavioral task
behavioral1
Sample
ghf.exe
Resource
win7-20240903-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
ghf.exe
-
Size
1.0MB
-
MD5
5d8c60d0a0f9455ed1535b0f47872505
-
SHA1
297d4ff53e738b518af330a522eefda5f17b52dc
-
SHA256
1097dac7d2c45ee287ab50d121ca2d0931ac6e954f6741a3991dae21ebec4231
-
SHA512
ffd89308d904031381b8959592b340be632461f041c84633b72f295e71672f153afad0037e464814d183efadf156fca296088eccd8e72bada265a0b64d39b025
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGso6Fa3rZi+oI+V9Q6WY:ou0c++OCvkGs9Fa3rZi+OVKY
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-