General
-
Target
4372-1130-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240219-hthd1aba85
-
MD5
d8a875f120bb439b7597e452847130db
-
SHA1
c5976caafa575767110bdbb37c293064e5cf802b
-
SHA256
5a7bece36d58ac8ec4d228c9f38ffc1b77ff4e96a5b3e9fde5048bed37e2c96f
-
SHA512
e47b8719e50211e6f62066965852608412b74fe9516099b67cae5b90bec994efb77459304572c71c1939c2aad1cf4092613b773d99953ce3f102a35ee2a583b0
-
SSDEEP
6144:71QJ9xtZ0NWAaHaSjt2o/u2++pGGJ9tXs:KJ9xtZ0sAaHaFob3pDe
Behavioral task
behavioral1
Sample
4372-1130-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4372-1130-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fnrgroup.com.my - Port:
587 - Username:
[email protected] - Password:
=0=,n;~qFBf) - Email To:
[email protected]
Targets
-
-
Target
4372-1130-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
d8a875f120bb439b7597e452847130db
-
SHA1
c5976caafa575767110bdbb37c293064e5cf802b
-
SHA256
5a7bece36d58ac8ec4d228c9f38ffc1b77ff4e96a5b3e9fde5048bed37e2c96f
-
SHA512
e47b8719e50211e6f62066965852608412b74fe9516099b67cae5b90bec994efb77459304572c71c1939c2aad1cf4092613b773d99953ce3f102a35ee2a583b0
-
SSDEEP
6144:71QJ9xtZ0NWAaHaSjt2o/u2++pGGJ9tXs:KJ9xtZ0sAaHaFob3pDe
Score1/10 -