General
-
Target
544-63-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
Sample
221207-plyjksaa6v
-
MD5
fa47f7aa03e2c54165c6a1aa28d11df5
-
SHA1
957c498cafcc5d1724a11a92483bb132fa42c2b5
-
SHA256
ba2d744557660af7968ab40f09409110c339b2d007a0df54aaf40aa75fb7cbd7
-
SHA512
90f5022bd587ce01ec1d41930eb950a4c87bce1fc4abece83b79ca6c128fc652e86203a3041b81d7eae3c4cefea5becdcf3b2f47a9a3fd6341f0ba7ca71a0260
-
SSDEEP
6144:hQoblnCafMWxyEUBzOB/zvGPeWNm5EG0rLNs:+oblZPxyU/WNm5zys
Behavioral task
behavioral1
Sample
544-63-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
544-63-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Logistics@1234
Targets
-
-
Target
544-63-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
MD5
fa47f7aa03e2c54165c6a1aa28d11df5
-
SHA1
957c498cafcc5d1724a11a92483bb132fa42c2b5
-
SHA256
ba2d744557660af7968ab40f09409110c339b2d007a0df54aaf40aa75fb7cbd7
-
SHA512
90f5022bd587ce01ec1d41930eb950a4c87bce1fc4abece83b79ca6c128fc652e86203a3041b81d7eae3c4cefea5becdcf3b2f47a9a3fd6341f0ba7ca71a0260
-
SSDEEP
6144:hQoblnCafMWxyEUBzOB/zvGPeWNm5EG0rLNs:+oblZPxyU/WNm5zys
Score1/10 -