General

  • Target

    4540-143-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • Sample

    220914-vncb1sahd4

  • MD5

    0b8d7657dea779ed8828e42182daa428

  • SHA1

    de6e9863f0ab2f367bf89813984bcb7d6bed9490

  • SHA256

    e76593906d874363e9b0933727282022adab283ddfbc7cd0bfb5d76dc13f2223

  • SHA512

    d787257a9f3f2ae68b513dd3ec2a1dca59e1a713f1e65e98691672cdae6fa8cedfd07df1c697a970cbd80a23656865de36ed79d0ec1b2e3d3fc0ea7dc353efe1

  • SSDEEP

    6144:3QaOWNtIY9nWcxbNudM3xzRUXIA10N85AdmVuRC/8DycIVvPYxJhORMXq:3QaOWWdncqOJQRD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Targets

    • Target

      4540-143-0x0000000000400000-0x000000000043A000-memory.dmp

    • Size

      232KB

    • MD5

      0b8d7657dea779ed8828e42182daa428

    • SHA1

      de6e9863f0ab2f367bf89813984bcb7d6bed9490

    • SHA256

      e76593906d874363e9b0933727282022adab283ddfbc7cd0bfb5d76dc13f2223

    • SHA512

      d787257a9f3f2ae68b513dd3ec2a1dca59e1a713f1e65e98691672cdae6fa8cedfd07df1c697a970cbd80a23656865de36ed79d0ec1b2e3d3fc0ea7dc353efe1

    • SSDEEP

      6144:3QaOWNtIY9nWcxbNudM3xzRUXIA10N85AdmVuRC/8DycIVvPYxJhORMXq:3QaOWWdncqOJQRD

    Score
    1/10

MITRE ATT&CK Matrix

Tasks