General

  • Target

    3932-139-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • Sample

    221003-j4bjwagbaj

  • MD5

    6ef7501580efa362efb89e7982207679

  • SHA1

    a1247d989ff026814f5a336bd1aafda25dd03da7

  • SHA256

    c2519128bf733d587114675129fb2b60dafc6ec4dcdddb8fe73bc668dd163b45

  • SHA512

    422881b2fdb5f5b9c6e939a3c8759550c178ba37d0343e4b1f7e9be69196d3b4d362fbd6fddaf617ef1135925300eba560f726c6024de54003b107fd654c8024

  • SSDEEP

    6144:Kl+rTehvGkUKJumK14T186A0yMDMrTmz:Kl+rTyGGJZyrq

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vhs-tr.com
  • Port:
    587
  • Username:
    rifat@vhs-tr.com
  • Password:
    $uugRUt3

Targets

    • Target

      3932-139-0x0000000000400000-0x000000000043A000-memory.dmp

    • Size

      232KB

    • MD5

      6ef7501580efa362efb89e7982207679

    • SHA1

      a1247d989ff026814f5a336bd1aafda25dd03da7

    • SHA256

      c2519128bf733d587114675129fb2b60dafc6ec4dcdddb8fe73bc668dd163b45

    • SHA512

      422881b2fdb5f5b9c6e939a3c8759550c178ba37d0343e4b1f7e9be69196d3b4d362fbd6fddaf617ef1135925300eba560f726c6024de54003b107fd654c8024

    • SSDEEP

      6144:Kl+rTehvGkUKJumK14T186A0yMDMrTmz:Kl+rTyGGJZyrq

    Score
    1/10

MITRE ATT&CK Matrix

Tasks