General

  • Target

    4056-146-0x0000000000400000-0x0000000000438000-memory.dmp

  • Size

    224KB

  • Sample

    221210-v3tjvaae31

  • MD5

    e35a1c8e8f5985f15710c8126df75a1d

  • SHA1

    8b16c4d22319ca8f5c26cb54ff9da1b86b503d30

  • SHA256

    85f575c173c23ab924115217ad7d34a0fb522d89ab7de0943f21c7b76d4186c6

  • SHA512

    9572ee50d2b67a60dbb54718d234bf12d5eff393263c1505b4ab6aa63de5e32483053494b087b09e297409333c4887f5d105c1f8967bb799addc79a1bebb0d2e

  • SSDEEP

    3072:GwEDU7HabeiLOk4KYgpvEmJOU5HIKZ7qrtauceH+I1fVrAIrDpN:wo7nKP1OU9IKZ6tatXCFpr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.btlntcrnet.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gosky080$

Targets

    • Target

      4056-146-0x0000000000400000-0x0000000000438000-memory.dmp

    • Size

      224KB

    • MD5

      e35a1c8e8f5985f15710c8126df75a1d

    • SHA1

      8b16c4d22319ca8f5c26cb54ff9da1b86b503d30

    • SHA256

      85f575c173c23ab924115217ad7d34a0fb522d89ab7de0943f21c7b76d4186c6

    • SHA512

      9572ee50d2b67a60dbb54718d234bf12d5eff393263c1505b4ab6aa63de5e32483053494b087b09e297409333c4887f5d105c1f8967bb799addc79a1bebb0d2e

    • SSDEEP

      3072:GwEDU7HabeiLOk4KYgpvEmJOU5HIKZ7qrtauceH+I1fVrAIrDpN:wo7nKP1OU9IKZ6tatXCFpr

    Score
    1/10

MITRE ATT&CK Matrix

Tasks