General
-
Target
ss.exe
-
Size
1.1MB
-
Sample
240701-fxkbnaxclf
-
MD5
11e6631c7459a5364e6a0d83f26e2005
-
SHA1
64f3f0043d9c36c261c9ad2c89fab70cb8347760
-
SHA256
44e2650ff2fc7ba8efcbc0a975b2d5ca2ecee228c6ee27df07b215ee79f5b320
-
SHA512
e993cc2421061e2ec0d2c0cde3befc07375797075d77188719620ecf53aab344c76b8270e9f23b93dec115c2560162573e284b7c4ee48d210cc2147c31b086f9
-
SSDEEP
24576:jAHnh+eWsN3skA4RV1Hom2KXMmHa9palnMfWsG2+yr5:uh+ZkldoPK8Ya9eTsG2+q
Static task
static1
Behavioral task
behavioral1
Sample
ss.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ss.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Targets
-
-
Target
ss.exe
-
Size
1.1MB
-
MD5
11e6631c7459a5364e6a0d83f26e2005
-
SHA1
64f3f0043d9c36c261c9ad2c89fab70cb8347760
-
SHA256
44e2650ff2fc7ba8efcbc0a975b2d5ca2ecee228c6ee27df07b215ee79f5b320
-
SHA512
e993cc2421061e2ec0d2c0cde3befc07375797075d77188719620ecf53aab344c76b8270e9f23b93dec115c2560162573e284b7c4ee48d210cc2147c31b086f9
-
SSDEEP
24576:jAHnh+eWsN3skA4RV1Hom2KXMmHa9palnMfWsG2+yr5:uh+ZkldoPK8Ya9eTsG2+q
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-