General
-
Target
2988-25-0x0000000000220000-0x0000000001282000-memory.dmp
-
Size
16.4MB
-
Sample
240428-rsjp4shg32
-
MD5
2e79f1eb314ec2632ce922d9b5cc0f97
-
SHA1
f7bfb4e413ecb5d69b2dc0b0e41fdd162da3c8a3
-
SHA256
8890d27ae9acfe5685cb960912accabdd58e5202d9d64aa31eb069c8cd8ba3ce
-
SHA512
c64afffee7c4f67c6919374f7c53dcfe2693a82359dbf78f014d345f2e5b591234e280fb903fa9e01a910c87377cd8cb333fd80277c48a9b9af8ec6c3a0fd6ba
-
SSDEEP
3072:GwvBp5xhyM9oIQSTKgjFiq5gCI0D5m5b5CvWnp:GwvBp5xhycxHPNk0D5mCe
Behavioral task
behavioral1
Sample
2988-25-0x0000000000220000-0x0000000001282000-memory.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2988-25-0x0000000000220000-0x0000000001282000-memory.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.controlfire.com.mx - Port:
587 - Username:
[email protected] - Password:
+DI9CNZM&Y%W - Email To:
[email protected]
Targets
-
-
Target
2988-25-0x0000000000220000-0x0000000001282000-memory.dmp
-
Size
16.4MB
-
MD5
2e79f1eb314ec2632ce922d9b5cc0f97
-
SHA1
f7bfb4e413ecb5d69b2dc0b0e41fdd162da3c8a3
-
SHA256
8890d27ae9acfe5685cb960912accabdd58e5202d9d64aa31eb069c8cd8ba3ce
-
SHA512
c64afffee7c4f67c6919374f7c53dcfe2693a82359dbf78f014d345f2e5b591234e280fb903fa9e01a910c87377cd8cb333fd80277c48a9b9af8ec6c3a0fd6ba
-
SSDEEP
3072:GwvBp5xhyM9oIQSTKgjFiq5gCI0D5m5b5CvWnp:GwvBp5xhycxHPNk0D5mCe
Score1/10 -