General
-
Target
516-64-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
Sample
230330-p56z3aeb7x
-
MD5
3e6f9cd130f21818f325838ee87124f9
-
SHA1
5c22d1546ca09c29786b1bb1d9c12431afb3e0f2
-
SHA256
bf6ffd915f0e7cca0cd69d9a4c7d796bb7ccebe9c8695f18141abd820052c6ad
-
SHA512
b78fa725b019bb5c22df3df78aeb42a02dbfe0c8e90e4f4f4f02dedc71029aaa9cd694f68d259edd981b36bcc466058aa22425fa9adb12dceb88a0c09e8ff045
-
SSDEEP
3072:ihpH6+wE1iuO/ALDlBt8x4M4tFVcLV9s:i+ov8IDllM8cx9
Behavioral task
behavioral1
Sample
516-64-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
516-64-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.printshopgt.com - Port:
587 - Username:
asistentedegerencia@printshopgt.com - Password:
G3r2021* - Email To:
asistentedegerencia@printshopgt.com
Targets
-
-
Target
516-64-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
3e6f9cd130f21818f325838ee87124f9
-
SHA1
5c22d1546ca09c29786b1bb1d9c12431afb3e0f2
-
SHA256
bf6ffd915f0e7cca0cd69d9a4c7d796bb7ccebe9c8695f18141abd820052c6ad
-
SHA512
b78fa725b019bb5c22df3df78aeb42a02dbfe0c8e90e4f4f4f02dedc71029aaa9cd694f68d259edd981b36bcc466058aa22425fa9adb12dceb88a0c09e8ff045
-
SSDEEP
3072:ihpH6+wE1iuO/ALDlBt8x4M4tFVcLV9s:i+ov8IDllM8cx9
Score1/10 -