General
-
Target
1120-63-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
Sample
221208-nn1laacg7y
-
MD5
808eb42cc752c498b66ece8694c695e5
-
SHA1
fc19768c6dd1f83ca91999d4cf18bf1039b47d45
-
SHA256
96638888c9c30dddb7e5f8dbb2cdaea3f166df8046c28aed4030005add69d171
-
SHA512
6e3a00fa82f179ea41ca6c66585785955d3b2acc4eaef930ba05e0a52bb37ecb85fe73e2d0667a1e57786db35711047b6eddd52f932aa304596320b0b858de0e
-
SSDEEP
3072:GwGMVB7p8BzmZ2Udb7q/vZ5zi/ACubxB6PPzsaHp07vk3M:GDopYzjUh7i5W/tubxB6PPbJOv
Behavioral task
behavioral1
Sample
1120-63-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1120-63-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cnseguros.hn - Port:
587 - Username:
llozano@cnseguros.hn - Password:
Rebecca2007
Targets
-
-
Target
1120-63-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
808eb42cc752c498b66ece8694c695e5
-
SHA1
fc19768c6dd1f83ca91999d4cf18bf1039b47d45
-
SHA256
96638888c9c30dddb7e5f8dbb2cdaea3f166df8046c28aed4030005add69d171
-
SHA512
6e3a00fa82f179ea41ca6c66585785955d3b2acc4eaef930ba05e0a52bb37ecb85fe73e2d0667a1e57786db35711047b6eddd52f932aa304596320b0b858de0e
-
SSDEEP
3072:GwGMVB7p8BzmZ2Udb7q/vZ5zi/ACubxB6PPzsaHp07vk3M:GDopYzjUh7i5W/tubxB6PPbJOv
Score1/10 -