General
-
Target
506827838d868d620296f148db3152f039f0ad983d5d236bb2f3d11c1e6f27bb
-
Size
556KB
-
Sample
250128-hsw6rs1pbl
-
MD5
94ab66c661c45aea2f3823df94863f94
-
SHA1
e8de4f2c76e9a421f5120374f8c224d790ce41fb
-
SHA256
506827838d868d620296f148db3152f039f0ad983d5d236bb2f3d11c1e6f27bb
-
SHA512
6a9fe0248ead21fd307773fd228e61692e3dab5977391c71be237eeba328d4e9d629c387428bdbec6a75a93e55b420650701060887674952f8c1c8d5208eb9a9
-
SSDEEP
12288:R51Tc3AWetJ2xxuO5OrRBz2EOTtH7vwT4REtvRiFijtrjtoiC/4Slxxx1p:1Tc+458Bz2EOxDs46tJhjtntDVgxx/p
Static task
static1
Behavioral task
behavioral1
Sample
ptm.exe
Resource
win7-20240708-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
ptm.exe
-
Size
1.1MB
-
MD5
f9de84414c0c576dd6c573b5d2460786
-
SHA1
c623051a6e9c1b84c4d8a2c4287e8ee8cea9037d
-
SHA256
3e8356cd8ca01e140e44272b1b07deedd679c85f9242746f819e6b9bc989dff4
-
SHA512
aa085c5e2712b343122ab0faf0e9b70f558f9d279fc818e0755126f523352b195ced2fa76ac7e595c4f86c567fc15b7fbf1a57188f5c8dab7ce29e2944a37c51
-
SSDEEP
24576:uAHnh+eWsN3skA4RV1Hom2KXFmIaFXVkQVJj3w5:Zh+ZkldoPK1XaFlkQ7K
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext
-