General
-
Target
2972-139-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
Sample
221205-nh5caahg6w
-
MD5
d164cbf25cbd4b62df6cc0c650f16061
-
SHA1
cf475f004f4746cd2d1cb6814d880a25d90a6428
-
SHA256
8886fe4fb5a6157bce09f16d7a8f30a9aa416de8f070d6c587996c0579a483c1
-
SHA512
1f569f69ba101f0193634e473f9a9c434be1c3ceadc5a6c6fc104e4d0c6ba76493090226425f3549098e09768ae1726f1093bbef558130db9fe6fcaefac31e40
-
SSDEEP
6144:5sUCJ+q8EG2U31JaQOfjCThHgn9/ju0lX4NR:a/h8EJkhuu0ER
Behavioral task
behavioral1
Sample
2972-139-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2972-139-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
bG^VamX7@@
Targets
-
-
Target
2972-139-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
MD5
d164cbf25cbd4b62df6cc0c650f16061
-
SHA1
cf475f004f4746cd2d1cb6814d880a25d90a6428
-
SHA256
8886fe4fb5a6157bce09f16d7a8f30a9aa416de8f070d6c587996c0579a483c1
-
SHA512
1f569f69ba101f0193634e473f9a9c434be1c3ceadc5a6c6fc104e4d0c6ba76493090226425f3549098e09768ae1726f1093bbef558130db9fe6fcaefac31e40
-
SSDEEP
6144:5sUCJ+q8EG2U31JaQOfjCThHgn9/ju0lX4NR:a/h8EJkhuu0ER
Score1/10 -