General
-
Target
2760-19-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
231211-kftwzsbbd4
-
MD5
cfecbe22aaa63848fa5e1321d8e1b975
-
SHA1
702a174e0e2c45afd66f38d2adca0580e51e9264
-
SHA256
ec4d2cdd6e1de70cf1efc32363ade62c0d8d79e1348dd6c75d44c33df9f9b094
-
SHA512
7b71331eaebafedde1c3a2f602996db9c520cb262ce02ca0e31dc997e8808f95b4a3ab401f29971b694e7b7f15ad8dee976ac3c907d5b9b4e4813ffcbd2e93ed
-
SSDEEP
3072:ju6mieCmnp/eh65kSbLY3/tCdQ3C5FME0W3:jfmieCmnp/eh7Sbk3/UdQ3hEL
Behavioral task
behavioral1
Sample
2760-19-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2760-19-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
B@JoCMD7@@ - Email To:
[email protected]
Targets
-
-
Target
2760-19-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
cfecbe22aaa63848fa5e1321d8e1b975
-
SHA1
702a174e0e2c45afd66f38d2adca0580e51e9264
-
SHA256
ec4d2cdd6e1de70cf1efc32363ade62c0d8d79e1348dd6c75d44c33df9f9b094
-
SHA512
7b71331eaebafedde1c3a2f602996db9c520cb262ce02ca0e31dc997e8808f95b4a3ab401f29971b694e7b7f15ad8dee976ac3c907d5b9b4e4813ffcbd2e93ed
-
SSDEEP
3072:ju6mieCmnp/eh65kSbLY3/tCdQ3C5FME0W3:jfmieCmnp/eh7Sbk3/UdQ3hEL
Score1/10 -