General
-
Target
2904-15-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231013-qfz1wsaa31
-
MD5
bc5c6790149d2f985069f545c027c0c1
-
SHA1
461504511232985c391c59e5fa732c5fcb728a3a
-
SHA256
0fbef280c665c31683f1e1ee797f596e09b04c8da97c14d0eb6fc02606f19580
-
SHA512
9a06a54fe7c20dfb5e2bdde2531d4b3e81c28e41d391f8a15d210052ad52e18a62ce62dc1dbeccbffebf58c8283078bcc2bf260d786f6fe9ee7af90d3f7a5b02
-
SSDEEP
3072:h6yJh4UXGpxKuQxSACiS2xo4SLLSNDhlLYZaWSnQC:kyJh4UKwxSACiS2xBSnSmZapn
Behavioral task
behavioral1
Sample
2904-15-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2904-15-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dynamicconsultinglogistics.ma - Port:
587 - Username:
a.fikar@dynamicconsultinglogistics.ma - Password:
Laanaya@2022 - Email To:
purchase@steamd.in
Targets
-
-
Target
2904-15-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
bc5c6790149d2f985069f545c027c0c1
-
SHA1
461504511232985c391c59e5fa732c5fcb728a3a
-
SHA256
0fbef280c665c31683f1e1ee797f596e09b04c8da97c14d0eb6fc02606f19580
-
SHA512
9a06a54fe7c20dfb5e2bdde2531d4b3e81c28e41d391f8a15d210052ad52e18a62ce62dc1dbeccbffebf58c8283078bcc2bf260d786f6fe9ee7af90d3f7a5b02
-
SSDEEP
3072:h6yJh4UXGpxKuQxSACiS2xo4SLLSNDhlLYZaWSnQC:kyJh4UKwxSACiS2xBSnSmZapn
Score1/10 -