General
-
Target
2124-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240606-szrjzaha62
-
MD5
084d54638ef612a6acafab9ea43a664f
-
SHA1
146ee7c9f48636d02726f861216a12a948bfd3b3
-
SHA256
a68215e81df0b4d99c8a001f2310c4798d5d78ad189aed5b7876688c38955140
-
SHA512
36879f7d94650c085fc38437b365df94be7d4500a88d3833ea8db0b3f26e85ce1d2b16b21fb88ee21d51ede09e002e794d0c09a0efb70107bbf2e1f637a59d4f
-
SSDEEP
3072:fuJN0wAxf3f3/5W013VovLSaUKh1iwcwr65dtqA9cA3p:2JN0zf3f3/5W013V2+anhAwcwrQqi
Behavioral task
behavioral1
Sample
2124-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2124-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
s30.securelayernetwork.com - Port:
587 - Username:
[email protected] - Password:
%lmb-a,[(1ty - Email To:
[email protected]
Targets
-
-
Target
2124-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
084d54638ef612a6acafab9ea43a664f
-
SHA1
146ee7c9f48636d02726f861216a12a948bfd3b3
-
SHA256
a68215e81df0b4d99c8a001f2310c4798d5d78ad189aed5b7876688c38955140
-
SHA512
36879f7d94650c085fc38437b365df94be7d4500a88d3833ea8db0b3f26e85ce1d2b16b21fb88ee21d51ede09e002e794d0c09a0efb70107bbf2e1f637a59d4f
-
SSDEEP
3072:fuJN0wAxf3f3/5W013VovLSaUKh1iwcwr65dtqA9cA3p:2JN0zf3f3/5W013V2+anhAwcwrQqi
Score1/10 -