General
-
Target
1284-4906-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240606-rltxhafc2z
-
MD5
6d08ff571bde7ff1d67c6d8532912160
-
SHA1
33ac3438be6e04e59e164a46920598a28ee0f199
-
SHA256
1e8999be338a21a287797badc3aaf9d36e19ba0dfcf1bfba0e805003c44469cd
-
SHA512
22485c4e700122dda15d58105ef088e86cc9dd7560053f073f3eb04a7d53b8c23fcc857445f9f3ea0e60e2697ef9fc9d4a1b55007ad93a4ff91815a7197b642f
-
SSDEEP
3072:GUayKSqQc9Nu+0Ji8K1Wx0JIe0+Z6sbl59v35iPCA:GUayKSqQcyZJYimIe0+ZdbZ35w
Behavioral task
behavioral1
Sample
1284-4906-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1284-4906-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
U+&%W@y1mSEUOinP - Email To:
[email protected]
Targets
-
-
Target
1284-4906-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
6d08ff571bde7ff1d67c6d8532912160
-
SHA1
33ac3438be6e04e59e164a46920598a28ee0f199
-
SHA256
1e8999be338a21a287797badc3aaf9d36e19ba0dfcf1bfba0e805003c44469cd
-
SHA512
22485c4e700122dda15d58105ef088e86cc9dd7560053f073f3eb04a7d53b8c23fcc857445f9f3ea0e60e2697ef9fc9d4a1b55007ad93a4ff91815a7197b642f
-
SSDEEP
3072:GUayKSqQc9Nu+0Ji8K1Wx0JIe0+Z6sbl59v35iPCA:GUayKSqQcyZJYimIe0+ZdbZ35w
Score1/10 -