General
-
Target
2372-11-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
Sample
231204-xlgvtsec4s
-
MD5
c3f609d09b4c23ffb9e8849f41026e0d
-
SHA1
a10bc125eddcf271bfe7abb0ab83ed2a4cec8fa9
-
SHA256
63c96ebc62d0d41c0b64e6f223c6e03f36cb22533a21b38e26fb889f243aa885
-
SHA512
02cbb792f66d436d6a4e129660f8579010559799ee3ae774d307b4a89b5b8ccf77ca8db820d6dacf85fa7ad18e0605fe42e0dbc8eb9e9039b0bbf6591a47539f
-
SSDEEP
3072:hdl+3w7knUdtHA9b+8FPY6YCDFO5nDnVpog5js:NknaA9b+8FQZ5nDn75
Behavioral task
behavioral1
Sample
2372-11-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2372-11-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
NX@@OLDdollarDV8FW7 - Email To:
[email protected]
Targets
-
-
Target
2372-11-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
c3f609d09b4c23ffb9e8849f41026e0d
-
SHA1
a10bc125eddcf271bfe7abb0ab83ed2a4cec8fa9
-
SHA256
63c96ebc62d0d41c0b64e6f223c6e03f36cb22533a21b38e26fb889f243aa885
-
SHA512
02cbb792f66d436d6a4e129660f8579010559799ee3ae774d307b4a89b5b8ccf77ca8db820d6dacf85fa7ad18e0605fe42e0dbc8eb9e9039b0bbf6591a47539f
-
SSDEEP
3072:hdl+3w7knUdtHA9b+8FPY6YCDFO5nDnVpog5js:NknaA9b+8FQZ5nDn75
Score1/10 -