General
-
Target
2948-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231124-v9flkadh81
-
MD5
f22e88cf2fd7cd6f5977620622b02558
-
SHA1
ac577c586fff96f9621560aedcecc3e8a563295b
-
SHA256
78122cfa0bada2610aed25d015540c4b1c9bc18cb7465434900da00d44f00b15
-
SHA512
9ff992e6f5027f379b429e7744030ece3b65e30a00284f874741386c4ddcefc625d3846e2eea1b38ca880573e99bcdad5fd21464e14a1808e830ebc30c6171b1
-
SSDEEP
3072:4AYyuymiXde26b9Seb/X3X+cA/daX5QdT9jGu:4AYyuymig26b9Seb/HOcAFag9q
Behavioral task
behavioral1
Sample
2948-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2948-10-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.amtechcards.com - Port:
587 - Username:
[email protected] - Password:
puuAt8;(Y$NU - Email To:
[email protected]
Targets
-
-
Target
2948-10-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
f22e88cf2fd7cd6f5977620622b02558
-
SHA1
ac577c586fff96f9621560aedcecc3e8a563295b
-
SHA256
78122cfa0bada2610aed25d015540c4b1c9bc18cb7465434900da00d44f00b15
-
SHA512
9ff992e6f5027f379b429e7744030ece3b65e30a00284f874741386c4ddcefc625d3846e2eea1b38ca880573e99bcdad5fd21464e14a1808e830ebc30c6171b1
-
SSDEEP
3072:4AYyuymiXde26b9Seb/X3X+cA/daX5QdT9jGu:4AYyuymig26b9Seb/HOcAFag9q
Score1/10 -