General

  • Target

    1724-64-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    221204-qpljvscf76

  • MD5

    3247cdefe514bc1a802d2396ff93ddde

  • SHA1

    bf3afcf3f2d79d0cc51f5da8d4b6e864d5481d3e

  • SHA256

    69a775c6733c2d94a0d0f8f159a82adad5aeaad93f049c9de7d7edd8a391495f

  • SHA512

    662d06b50b83dc745d289841c9bad4ec4bf3b40021ca47288f6df2b5faaadfa28ec85a503a553477860dba0cf41c15ec8bb2d72230e369b7eff0fb998a31a94b

  • SSDEEP

    3072:LBNyshskPCxV4+n+5Kh+qfPK/dswUspddJRvNdwAPl2kdbzZGRCOrQ/zSH:LjySCgA+qavUaPJpwA9H3ZGRXrUzS

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    host39.registrar-servers.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MI{ml&po^Oii 123

Targets

    • Target

      1724-64-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      3247cdefe514bc1a802d2396ff93ddde

    • SHA1

      bf3afcf3f2d79d0cc51f5da8d4b6e864d5481d3e

    • SHA256

      69a775c6733c2d94a0d0f8f159a82adad5aeaad93f049c9de7d7edd8a391495f

    • SHA512

      662d06b50b83dc745d289841c9bad4ec4bf3b40021ca47288f6df2b5faaadfa28ec85a503a553477860dba0cf41c15ec8bb2d72230e369b7eff0fb998a31a94b

    • SSDEEP

      3072:LBNyshskPCxV4+n+5Kh+qfPK/dswUspddJRvNdwAPl2kdbzZGRCOrQ/zSH:LjySCgA+qavUaPJpwA9H3ZGRXrUzS

    Score
    1/10

MITRE ATT&CK Matrix

Tasks