General

  • Target

    1972-141-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    221125-ce2w7sde49

  • MD5

    d404f977f7a3ea1b2adb9523e0e47679

  • SHA1

    d060e6054a1ab11ebbfa4db6c936778b6f8bec34

  • SHA256

    ce86b12595a266af8048899e0497f96a534e88df3e0e9c8b85ba0471d3b61370

  • SHA512

    b4766c3661db5546c5ae31fc89f643a10483a40e4d94455987db7f49e53fe0c3267db2ba2ab441c5365790d2f7956623d2ca1b50cea546e35e1f1f0547d8c6b9

  • SSDEEP

    3072:Wd5z4Fn+eVkJ2jiI3ouZ5EQw2ZIvUslpdrtl9OM9KimhNqvM6EYSi5+W6LHYr6r6:WbXewK2EyUeXxyM9KL2ZEAp6kOrViz

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aldantechnoloqy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gbo-~_i.X0tv

Targets

    • Target

      1972-141-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      d404f977f7a3ea1b2adb9523e0e47679

    • SHA1

      d060e6054a1ab11ebbfa4db6c936778b6f8bec34

    • SHA256

      ce86b12595a266af8048899e0497f96a534e88df3e0e9c8b85ba0471d3b61370

    • SHA512

      b4766c3661db5546c5ae31fc89f643a10483a40e4d94455987db7f49e53fe0c3267db2ba2ab441c5365790d2f7956623d2ca1b50cea546e35e1f1f0547d8c6b9

    • SSDEEP

      3072:Wd5z4Fn+eVkJ2jiI3ouZ5EQw2ZIvUslpdrtl9OM9KimhNqvM6EYSi5+W6LHYr6r6:WbXewK2EyUeXxyM9KL2ZEAp6kOrViz

    Score
    1/10

MITRE ATT&CK Matrix

Tasks