General
-
Target
2500-29-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240429-mlds3agd79
-
MD5
f5c72389b0bd07bb5b098687aa3e3413
-
SHA1
b984a40adcef9bf0612db60278f471c65b7531f6
-
SHA256
da3ec32c7b9ae8d90457edf2dbfd51d670ab841bcfb62b96738811096d168afc
-
SHA512
218892c5f7aad23d95678824249223d9263f275ee9399f94835af723efbb61e14538b6d494a846cf80564bdb6ec5e0ffd64cee5eec3b88da9d020d76f66513de
-
SSDEEP
3072:eo/7VrN6xlzT7LTjD1vDUdWf2ldFSHLcCnX5hJnTRV:X7VrN6xlzT7LTjD1vtYuHLcCnNnd
Behavioral task
behavioral1
Sample
2500-29-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2500-29-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nooshdaroodc.com - Port:
587 - Username:
[email protected] - Password:
Nou$h@Darou - Email To:
[email protected]
Targets
-
-
Target
2500-29-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
f5c72389b0bd07bb5b098687aa3e3413
-
SHA1
b984a40adcef9bf0612db60278f471c65b7531f6
-
SHA256
da3ec32c7b9ae8d90457edf2dbfd51d670ab841bcfb62b96738811096d168afc
-
SHA512
218892c5f7aad23d95678824249223d9263f275ee9399f94835af723efbb61e14538b6d494a846cf80564bdb6ec5e0ffd64cee5eec3b88da9d020d76f66513de
-
SSDEEP
3072:eo/7VrN6xlzT7LTjD1vDUdWf2ldFSHLcCnX5hJnTRV:X7VrN6xlzT7LTjD1vtYuHLcCnNnd
Score1/10 -