General
-
Target
2328-5-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
241003-edsm9awhqh
-
MD5
b0d5bd54c5cd8274c5c1a0c283a05930
-
SHA1
b160e379e42428d0a36e6450776d449608558ec0
-
SHA256
4c764bc8abc47435be8eb62643b97d6afdc2301982b9d3af354475b19f3ac6ff
-
SHA512
f8c5f9925e63f1b8eb57c856ae6f852a09faf1d101e10682c7e32bed143a62006d271e8b496b02c523ca4b2c3f5f52f754709ce2ac88f721b5f8d9d92c2b042d
-
SSDEEP
3072:2DZmyuyGLY/EsbHKHpBTkPajL5C0IDQq:2DZmyuyGLY/EsbHKJBbjNIU
Behavioral task
behavioral1
Sample
2328-5-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2328-5-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
srv.masternic.net - Port:
587 - Username:
[email protected] - Password:
-H{2Szxi!%qb - Email To:
[email protected]
Targets
-
-
Target
2328-5-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
b0d5bd54c5cd8274c5c1a0c283a05930
-
SHA1
b160e379e42428d0a36e6450776d449608558ec0
-
SHA256
4c764bc8abc47435be8eb62643b97d6afdc2301982b9d3af354475b19f3ac6ff
-
SHA512
f8c5f9925e63f1b8eb57c856ae6f852a09faf1d101e10682c7e32bed143a62006d271e8b496b02c523ca4b2c3f5f52f754709ce2ac88f721b5f8d9d92c2b042d
-
SSDEEP
3072:2DZmyuyGLY/EsbHKHpBTkPajL5C0IDQq:2DZmyuyGLY/EsbHKJBbjNIU
Score1/10 -