General
-
Target
2444-28-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240522-dnry2aad24
-
MD5
28184d1b5cf3bc4586a506e3ae5ae109
-
SHA1
80849d5d941c5e6d0c41b1446e902d40e08d3f75
-
SHA256
e65c7bc85c04275d2487af8f4bcad72a5bb2309df4845fe178c9723c06202c9d
-
SHA512
e5ea53ecb02c32cc186fed37e699ee3a3405c597513e0b722d7171d863132ea2ec3fa836d211c0f98b28aff9025caa228264f03e11fe21fe82d129efa1943633
-
SSDEEP
3072:hx0wsYqN7ZlXkE0kkzFHen9BxXUJQEGpcFSXsb5Q3Lnlg:hsYqN7ZlXkE0kkzcTk9UcFScoLl
Behavioral task
behavioral1
Sample
2444-28-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2444-28-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.activefreightpak.com - Port:
587 - Username:
[email protected] - Password:
AFSPL**77** - Email To:
[email protected]
Targets
-
-
Target
2444-28-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
28184d1b5cf3bc4586a506e3ae5ae109
-
SHA1
80849d5d941c5e6d0c41b1446e902d40e08d3f75
-
SHA256
e65c7bc85c04275d2487af8f4bcad72a5bb2309df4845fe178c9723c06202c9d
-
SHA512
e5ea53ecb02c32cc186fed37e699ee3a3405c597513e0b722d7171d863132ea2ec3fa836d211c0f98b28aff9025caa228264f03e11fe21fe82d129efa1943633
-
SSDEEP
3072:hx0wsYqN7ZlXkE0kkzFHen9BxXUJQEGpcFSXsb5Q3Lnlg:hsYqN7ZlXkE0kkzcTk9UcFScoLl
Score1/10 -