General

  • Target

    1108-67-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    221209-l62j7afg5x

  • MD5

    17bf6e2b82844c31b77f6bcb6dc5bea0

  • SHA1

    2a73f54104d153a8d86672fa9c84af5bba19a1bd

  • SHA256

    3a449f97d6e5e71543a5601e1d1c308abca71290e4f447b1f949bdd958b50a7f

  • SHA512

    8b92a8219981792a6c4730816728822473ecc11efff2f3644579d6e41bd62e98d746d059d50519f4acc4161ebf7e3bf0d2e09930ff92626a1b146f41e1570e9c

  • SSDEEP

    3072:fT8gGK8+evWMcpyNC8xJqUG285BfUsRc4a/ySsua/IGPhUrq4ak0Ccerb/zn:fYqepMIROLUQcVQuiIGP74ak7lrDzn

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.deconbrio.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Aa5nm2gb@kgb.

Targets

    • Target

      1108-67-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      17bf6e2b82844c31b77f6bcb6dc5bea0

    • SHA1

      2a73f54104d153a8d86672fa9c84af5bba19a1bd

    • SHA256

      3a449f97d6e5e71543a5601e1d1c308abca71290e4f447b1f949bdd958b50a7f

    • SHA512

      8b92a8219981792a6c4730816728822473ecc11efff2f3644579d6e41bd62e98d746d059d50519f4acc4161ebf7e3bf0d2e09930ff92626a1b146f41e1570e9c

    • SSDEEP

      3072:fT8gGK8+evWMcpyNC8xJqUG285BfUsRc4a/ySsua/IGPhUrq4ak0Ccerb/zn:fYqepMIROLUQcVQuiIGP74ak7lrDzn

    Score
    1/10

MITRE ATT&CK Matrix

Tasks