General
-
Target
2524-75-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
Sample
230717-jb3snaaf78
-
MD5
ffa50b3b08d1cb57193578b1d5f98733
-
SHA1
c607747492296df32955f2cefc1c7af5ca9973e6
-
SHA256
48f505ff7e7fee77acdea35cb94d265640402470e189b5b06127a8ac677301ef
-
SHA512
f668219dc852102d73024a4e026d592bba4347c0ebf05779f48f395c970f121578a6ef2e3b8e22b771efe0a0340e106815e4f103ddc67fbf9af0b5cf2f9965ca
-
SSDEEP
3072:xpr/2b3gU1Inhj/2i1pv4zXA4v2YtMack42MVfh7Z3:x5+cUAhj/2i1SN2Yvqf
Behavioral task
behavioral1
Sample
2524-75-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2524-75-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mylaconsultancy.com - Port:
587 - Username:
[email protected] - Password:
Myl@@cc0unts - Email To:
[email protected]
Targets
-
-
Target
2524-75-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
ffa50b3b08d1cb57193578b1d5f98733
-
SHA1
c607747492296df32955f2cefc1c7af5ca9973e6
-
SHA256
48f505ff7e7fee77acdea35cb94d265640402470e189b5b06127a8ac677301ef
-
SHA512
f668219dc852102d73024a4e026d592bba4347c0ebf05779f48f395c970f121578a6ef2e3b8e22b771efe0a0340e106815e4f103ddc67fbf9af0b5cf2f9965ca
-
SSDEEP
3072:xpr/2b3gU1Inhj/2i1pv4zXA4v2YtMack42MVfh7Z3:x5+cUAhj/2i1SN2Yvqf
Score1/10 -