General
-
Target
2620-18-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
Sample
240101-lgfanaffck
-
MD5
440c710abb599d946fe13a012d2e783c
-
SHA1
6877ea61fa05d3aae7b4fbc585a5378a17bce77d
-
SHA256
cf2feae43ad039ad1f17b8ffe61e8666a2cc9bcbea00999a78915c3a58e3804f
-
SHA512
f423d3a2b9efbc9e2f60eae7d6dee9a67f3727b809c5f95cf4f97b03adbeb5a454fb580534772c7dd8fc8cef8370df550d5e1c729002b670963369a2ba9efc4f
-
SSDEEP
6144:QRTetXqhWwKKHLGxGUTZbHKdiR7pjYwEIrnuz:7tXqB3HCx1R7pcvJz
Behavioral task
behavioral1
Sample
2620-18-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2620-18-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rimiapparelsltd.com - Port:
587 - Username:
[email protected] - Password:
Everest10@ - Email To:
[email protected]
Targets
-
-
Target
2620-18-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
MD5
440c710abb599d946fe13a012d2e783c
-
SHA1
6877ea61fa05d3aae7b4fbc585a5378a17bce77d
-
SHA256
cf2feae43ad039ad1f17b8ffe61e8666a2cc9bcbea00999a78915c3a58e3804f
-
SHA512
f423d3a2b9efbc9e2f60eae7d6dee9a67f3727b809c5f95cf4f97b03adbeb5a454fb580534772c7dd8fc8cef8370df550d5e1c729002b670963369a2ba9efc4f
-
SSDEEP
6144:QRTetXqhWwKKHLGxGUTZbHKdiR7pjYwEIrnuz:7tXqB3HCx1R7pcvJz
Score1/10 -