General
-
Target
1652-17-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
240522-xhq94acf5x
-
MD5
a39e0d6432f3abf4d4d6cc9ed923272d
-
SHA1
6b089c84bb333028df23c018faa8bf9066594a88
-
SHA256
c20a60520acfa6fd794c24ff012aaa5ff5f0d6248d90d4026ad660b891ce60a1
-
SHA512
6f2efe3519b70e94220b7dd728162e8f9750fd91ca459a074c49626277931f06d3844880c21e4cdf60e124e400622968285d49155ad9bb67b5d2cae30bc6c827
-
SSDEEP
3072:4ZhI8vGyMUQqLbWvdMFc5qsKIc8NML5DkbV7qG:4ZhI8vGyMUQqLbWv2chlNM+VO
Behavioral task
behavioral1
Sample
1652-17-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1652-17-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cash4cars.nz - Port:
587 - Username:
[email protected] - Password:
logs2024! - Email To:
[email protected]
Targets
-
-
Target
1652-17-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
a39e0d6432f3abf4d4d6cc9ed923272d
-
SHA1
6b089c84bb333028df23c018faa8bf9066594a88
-
SHA256
c20a60520acfa6fd794c24ff012aaa5ff5f0d6248d90d4026ad660b891ce60a1
-
SHA512
6f2efe3519b70e94220b7dd728162e8f9750fd91ca459a074c49626277931f06d3844880c21e4cdf60e124e400622968285d49155ad9bb67b5d2cae30bc6c827
-
SSDEEP
3072:4ZhI8vGyMUQqLbWvdMFc5qsKIc8NML5DkbV7qG:4ZhI8vGyMUQqLbWv2chlNM+VO
Score1/10 -