General
-
Target
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
-
Size
1.1MB
-
Sample
250110-r631xaxmfy
-
MD5
45af51c7c9f455cb7ecbc601fdb6a7ae
-
SHA1
d8a37ff0c1f3079af23010db6e0ff46390f5da21
-
SHA256
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779
-
SHA512
02a1236586ce8c137e240c68e92273b68ae7d4a02813049d5273e8670b6e0d8a6ec3689e4c612284dde2c7ca9261e3d4368508e313e4a047644f8edd7e35dbf2
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6FacZKyUgixEGTTD/9CWY:Ru0c++OCvkGs9FacZtURxnr/7Y
Static task
static1
Behavioral task
behavioral1
Sample
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779.exe
-
Size
1.1MB
-
MD5
45af51c7c9f455cb7ecbc601fdb6a7ae
-
SHA1
d8a37ff0c1f3079af23010db6e0ff46390f5da21
-
SHA256
72a1ba2aaf8d724372e2592797580d085f48ccdcc9f3985eb01b108a49fe5779
-
SHA512
02a1236586ce8c137e240c68e92273b68ae7d4a02813049d5273e8670b6e0d8a6ec3689e4c612284dde2c7ca9261e3d4368508e313e4a047644f8edd7e35dbf2
-
SSDEEP
24576:3u6J33O0c+JY5UZ+XC0kGso6FacZKyUgixEGTTD/9CWY:Ru0c++OCvkGs9FacZtURxnr/7Y
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-