General
-
Target
2548-28-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240423-rtt78shb33
-
MD5
33803d5c7226ca4f7f2a77ad28a574fe
-
SHA1
570d044e381d014a1d3d9ffc7ad6df38b43c001e
-
SHA256
2510f10579b6c2d0ccac531163c15ea32d32683864e3f623eff1171d8bb4fc0a
-
SHA512
4a0fa296fbec5af9d54400670b4c169a85ac93b2b9b918b4b2a150be750061bf74515552e64cfa4b369777e2b2259e70c9e0d195a7b01d8880f42320eb0f71fb
-
SSDEEP
3072:GnkhZBZMP3EyQP/+fCg5a0Sg6NA5UKCAdj:GnkhZBZM8yEm6ya0Sg6N8CA
Behavioral task
behavioral1
Sample
2548-28-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2548-28-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rwa-at.com - Port:
587 - Username:
[email protected] - Password:
CASH@COM12345 - Email To:
[email protected]
Targets
-
-
Target
2548-28-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
33803d5c7226ca4f7f2a77ad28a574fe
-
SHA1
570d044e381d014a1d3d9ffc7ad6df38b43c001e
-
SHA256
2510f10579b6c2d0ccac531163c15ea32d32683864e3f623eff1171d8bb4fc0a
-
SHA512
4a0fa296fbec5af9d54400670b4c169a85ac93b2b9b918b4b2a150be750061bf74515552e64cfa4b369777e2b2259e70c9e0d195a7b01d8880f42320eb0f71fb
-
SSDEEP
3072:GnkhZBZMP3EyQP/+fCg5a0Sg6NA5UKCAdj:GnkhZBZM8yEm6ya0Sg6N8CA
Score1/10 -