General

  • Target

    788-63-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    221208-qxfctadb4t

  • MD5

    77752346a7798c2423adf8852fb6dcf8

  • SHA1

    21ce99d56303ab7375cdb57aa2af02d8c8984510

  • SHA256

    b585a3a83be16f0895821d027cc2b23c1bd78360fdef115d3683731dfd49a54a

  • SHA512

    0e95b33b308bcbf67f5f5d69fcf6687cd2505ef3aa9dc27d102c9d2b507cb4dbcd6446370da167d13fd5e554bdcf9d45e89f3811072592c3fe50edfd86c772ac

  • SSDEEP

    6144:QwMCxmARqURovA+h5JT9Yg7bO2sOu6Irdxq:jiARrIZsu2q

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    host39.registrar-servers.com
  • Port:
    587
  • Username:
    rinosoftoffice@potashin.us
  • Password:
    q9 % .=I2 2 R}{$

Targets

    • Target

      788-63-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      77752346a7798c2423adf8852fb6dcf8

    • SHA1

      21ce99d56303ab7375cdb57aa2af02d8c8984510

    • SHA256

      b585a3a83be16f0895821d027cc2b23c1bd78360fdef115d3683731dfd49a54a

    • SHA512

      0e95b33b308bcbf67f5f5d69fcf6687cd2505ef3aa9dc27d102c9d2b507cb4dbcd6446370da167d13fd5e554bdcf9d45e89f3811072592c3fe50edfd86c772ac

    • SSDEEP

      6144:QwMCxmARqURovA+h5JT9Yg7bO2sOu6Irdxq:jiARrIZsu2q

    Score
    3/10

MITRE ATT&CK Matrix

Tasks