General
-
Target
2940-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231204-kexw9ahh7t
-
MD5
67c5d21301bc3f61ef0081d4d3849524
-
SHA1
d00c0d10410a772ebb10f25b6381955b2d2041dc
-
SHA256
905a4749f631cd9056bb72ebb82333823ebc14de7eee6a749268dd7bcace4b32
-
SHA512
54c8286f0326155db33561dd1a70ad15eed4da560ac48322cf5f42e6d6609a07c271c1d29b27d7dfde50aa0f47f196c26a889a77d8451c49beba090108eb351b
-
SSDEEP
3072:JP5iuCWSSAbqoch/D4cF5csML6MT8IU3Yd5pJmUdSe:3iuCWSSAbqoO/l5cLlQ/Y/mx
Behavioral task
behavioral1
Sample
2940-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2940-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231201-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kivuresort.co.ke - Port:
587 - Username:
[email protected] - Password:
Kivu@2020 - Email To:
[email protected]
Targets
-
-
Target
2940-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
67c5d21301bc3f61ef0081d4d3849524
-
SHA1
d00c0d10410a772ebb10f25b6381955b2d2041dc
-
SHA256
905a4749f631cd9056bb72ebb82333823ebc14de7eee6a749268dd7bcace4b32
-
SHA512
54c8286f0326155db33561dd1a70ad15eed4da560ac48322cf5f42e6d6609a07c271c1d29b27d7dfde50aa0f47f196c26a889a77d8451c49beba090108eb351b
-
SSDEEP
3072:JP5iuCWSSAbqoch/D4cF5csML6MT8IU3Yd5pJmUdSe:3iuCWSSAbqoO/l5cLlQ/Y/mx
Score1/10 -