General
-
Target
1356-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240429-vxbf3sga66
-
MD5
fb1eb8a9d943af740778f57797ba229a
-
SHA1
c9b5ce8722b08243b7dd8a557bddd9f6f35439ed
-
SHA256
ddeb8ece5713aae5d633f91f7df83b5df0f9c19c58d7d31fb4b4f6e14c33312b
-
SHA512
4ff10e1f9ac29355938537037e18aef4c08947c4f1d8df84cd7d369abfbd4d59c3cb8d7729d36a38b444c761fda5f7d67fe64ee9b989e48c80f382bb3d4042b3
-
SSDEEP
3072:YNLlFU/Xqe81YrKnyWUKfaPIh0cK5KIip95qJH:yLlFU/Xqe8WrKyWnGIh0caiz
Behavioral task
behavioral1
Sample
1356-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1356-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cash4cars.nz - Port:
587 - Username:
[email protected] - Password:
logs2024! - Email To:
[email protected]
Targets
-
-
Target
1356-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
fb1eb8a9d943af740778f57797ba229a
-
SHA1
c9b5ce8722b08243b7dd8a557bddd9f6f35439ed
-
SHA256
ddeb8ece5713aae5d633f91f7df83b5df0f9c19c58d7d31fb4b4f6e14c33312b
-
SHA512
4ff10e1f9ac29355938537037e18aef4c08947c4f1d8df84cd7d369abfbd4d59c3cb8d7729d36a38b444c761fda5f7d67fe64ee9b989e48c80f382bb3d4042b3
-
SSDEEP
3072:YNLlFU/Xqe81YrKnyWUKfaPIh0cK5KIip95qJH:yLlFU/Xqe8WrKyWnGIh0caiz
Score3/10 -