General

  • Target

    1568-66-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • Sample

    230329-kz3cgaff26

  • MD5

    c0e5d461710042026d0524962e19fe3d

  • SHA1

    5c1f0d7a7baa1c3ec6888209b002ad838b642789

  • SHA256

    af74e0a0e9107102271692dded85c8f970a808143bfc0f5f82e9a7721f26a14c

  • SHA512

    101e8384f9ca06621bbb7bb2f1c778ffed2af28cc173fa43969e798de39f9ef79ce88109a06e17795dd50e54c4fed9cdc7defa228b0fc70ce30f3f9d99bb33d3

  • SSDEEP

    3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1:nCcFA+Mle74/HJDFC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.yurabeauty.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    computer@147

Targets

    • Target

      1568-66-0x0000000000400000-0x0000000000430000-memory.dmp

    • Size

      192KB

    • MD5

      c0e5d461710042026d0524962e19fe3d

    • SHA1

      5c1f0d7a7baa1c3ec6888209b002ad838b642789

    • SHA256

      af74e0a0e9107102271692dded85c8f970a808143bfc0f5f82e9a7721f26a14c

    • SHA512

      101e8384f9ca06621bbb7bb2f1c778ffed2af28cc173fa43969e798de39f9ef79ce88109a06e17795dd50e54c4fed9cdc7defa228b0fc70ce30f3f9d99bb33d3

    • SSDEEP

      3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1:nCcFA+Mle74/HJDFC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks