General
-
Target
2628-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240508-mnkdmagc4t
-
MD5
c86531c444e7515da98bc5168dc72847
-
SHA1
d0f32f71ac32c9e2d532db4fc8443f6018fbee75
-
SHA256
bd6584be7ff95bc665dfcd8b10317edeaa84c258ddb74aeb54d92d550a090a65
-
SHA512
7e492c83b0dcc471490718a105c7cb8242360f44bac01786c865e87b09a087055f976611a532e71478401bff3ac4405f2035a66ba106f4996c92d889f79446bb
-
SSDEEP
3072:ezzMUkc8oPcjjM2LSaYnjq8PTyz1Nl56dN00y:IMUkc8KcjjNmaYnjTLyz1NeNpy
Behavioral task
behavioral1
Sample
2628-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2628-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.z2neumec.com - Port:
587 - Username:
[email protected] - Password:
Gid@2021 - Email To:
[email protected]
Targets
-
-
Target
2628-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
c86531c444e7515da98bc5168dc72847
-
SHA1
d0f32f71ac32c9e2d532db4fc8443f6018fbee75
-
SHA256
bd6584be7ff95bc665dfcd8b10317edeaa84c258ddb74aeb54d92d550a090a65
-
SHA512
7e492c83b0dcc471490718a105c7cb8242360f44bac01786c865e87b09a087055f976611a532e71478401bff3ac4405f2035a66ba106f4996c92d889f79446bb
-
SSDEEP
3072:ezzMUkc8oPcjjM2LSaYnjq8PTyz1Nl56dN00y:IMUkc8KcjjNmaYnjTLyz1NeNpy
Score1/10 -