General

  • Target

    1308-64-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    221205-twypjsfe95

  • MD5

    3ca48a435f4ea7c54b2fbabb39b52f65

  • SHA1

    ee34e2182f5978a0c569746d6f8d1120c35241a8

  • SHA256

    c6838f67096aa7bb26040e56308c47d681558bcc057414e86c858087c9ef3598

  • SHA512

    d8a405bded57da9586ec7a3b290697f61dae7a34f5ecf54a71cd4be4ae7d478bbc11de8f90054cd0eaa3bb9867ecb582849ee8f78a215cac32d6f66d22c2e29b

  • SSDEEP

    3072:We4ILA+9+eDSMLYe9MlaaB6Ho7vUsycC7X0RpW3zvSmJZ2GXfuffKY6rz/0n:WzI0emVxIYUdcWc03bH2wfu3KlrL0n

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    host39.registrar-servers.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    payment 12345

Targets

    • Target

      1308-64-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      3ca48a435f4ea7c54b2fbabb39b52f65

    • SHA1

      ee34e2182f5978a0c569746d6f8d1120c35241a8

    • SHA256

      c6838f67096aa7bb26040e56308c47d681558bcc057414e86c858087c9ef3598

    • SHA512

      d8a405bded57da9586ec7a3b290697f61dae7a34f5ecf54a71cd4be4ae7d478bbc11de8f90054cd0eaa3bb9867ecb582849ee8f78a215cac32d6f66d22c2e29b

    • SSDEEP

      3072:We4ILA+9+eDSMLYe9MlaaB6Ho7vUsycC7X0RpW3zvSmJZ2GXfuffKY6rz/0n:WzI0emVxIYUdcWc03bH2wfu3KlrL0n

    Score
    1/10

MITRE ATT&CK Matrix

Tasks