General

  • Target

    1528-63-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • Sample

    221208-npp6yacg71

  • MD5

    3b83adca6bc6cafc39dc7e9287bd60a3

  • SHA1

    c658a9d038f1a769941db4bd363ff752b30382e7

  • SHA256

    d2e170432943ca4936c9d5d608c912c033fddac49f93c4d6983c8e3b344bbde5

  • SHA512

    df17318e4aa0aa989bcff981c47cdb5f6ecfc131db40041057824868a893767d4a48712f0e0c001eed49960f84c1ae914c006bf4c2e64c3e4cb0cf2b4b0a12e1

  • SSDEEP

    3072:8wDfVZGGv4NnclURjb1ehLEWXnULZVAJ6xrdRfVvn3M:8KiGgulURXshLxXnULZVAYxrD9v

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    hipifinance@honesyvvell.com
  • Password:
    Logistics@1234

Targets

    • Target

      1528-63-0x0000000000400000-0x000000000042E000-memory.dmp

    • Size

      184KB

    • MD5

      3b83adca6bc6cafc39dc7e9287bd60a3

    • SHA1

      c658a9d038f1a769941db4bd363ff752b30382e7

    • SHA256

      d2e170432943ca4936c9d5d608c912c033fddac49f93c4d6983c8e3b344bbde5

    • SHA512

      df17318e4aa0aa989bcff981c47cdb5f6ecfc131db40041057824868a893767d4a48712f0e0c001eed49960f84c1ae914c006bf4c2e64c3e4cb0cf2b4b0a12e1

    • SSDEEP

      3072:8wDfVZGGv4NnclURjb1ehLEWXnULZVAJ6xrdRfVvn3M:8KiGgulURXshLxXnULZVAYxrD9v

    Score
    1/10

MITRE ATT&CK Matrix

Tasks