General

  • Target

    2476-169-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • Sample

    221209-1gcbbshc5v

  • MD5

    f819b65cdb05f360e13663ed98251637

  • SHA1

    e366843acc2886dfb41e91829d069dfde25ed6dd

  • SHA256

    af772e67b3d940f1eeeb3e09f6d1c762734a2b333259f6c818670324c61e5b51

  • SHA512

    3e02e40cf5394cb07119521acf3805e8ef3a21ec8c5d5c799e90602fa8ca39817521c59879301b6d9d03685f230318819f802c2ce625e92495f5e33f5974bccc

  • SSDEEP

    3072:zwGMVt7p8BzmZ2UQ+raXAWNmdCJWfTQ2Y9IzKw5ArVEo3Ms:zD0pYzjUQ2aXW0JWfTQ2Y9ItyhE

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    work-toolz.click
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    3HLkst~=QzD3

Targets

    • Target

      2476-169-0x0000000000400000-0x000000000042E000-memory.dmp

    • Size

      184KB

    • MD5

      f819b65cdb05f360e13663ed98251637

    • SHA1

      e366843acc2886dfb41e91829d069dfde25ed6dd

    • SHA256

      af772e67b3d940f1eeeb3e09f6d1c762734a2b333259f6c818670324c61e5b51

    • SHA512

      3e02e40cf5394cb07119521acf3805e8ef3a21ec8c5d5c799e90602fa8ca39817521c59879301b6d9d03685f230318819f802c2ce625e92495f5e33f5974bccc

    • SSDEEP

      3072:zwGMVt7p8BzmZ2UQ+raXAWNmdCJWfTQ2Y9IzKw5ArVEo3Ms:zD0pYzjUQ2aXW0JWfTQ2Y9ItyhE

    Score
    1/10

MITRE ATT&CK Matrix

Tasks