General

  • Target

    1312-71-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • Sample

    230329-kzr7haff24

  • MD5

    7e64c8a973a02ece577457ceed5f2c8b

  • SHA1

    8c11fc55e5a04b3fb60e0920329b634d37e236f1

  • SHA256

    3c78c9808ff1d575488cb39eab90ca3a421db4d6346aeefcf984f9e09c1d4877

  • SHA512

    82a594964b53f0c144aff614daa7f511917de9d0edfc1291f5be34b7f85f6eab9b2977db2959d61a02921b5536106c9b94dd5590f9daf6600c0330abdf04954e

  • SSDEEP

    3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1Q:nCcFA+Mle74/HJDFC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.yurabeauty.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    computer@147

Targets

    • Target

      1312-71-0x0000000000400000-0x0000000000430000-memory.dmp

    • Size

      192KB

    • MD5

      7e64c8a973a02ece577457ceed5f2c8b

    • SHA1

      8c11fc55e5a04b3fb60e0920329b634d37e236f1

    • SHA256

      3c78c9808ff1d575488cb39eab90ca3a421db4d6346aeefcf984f9e09c1d4877

    • SHA512

      82a594964b53f0c144aff614daa7f511917de9d0edfc1291f5be34b7f85f6eab9b2977db2959d61a02921b5536106c9b94dd5590f9daf6600c0330abdf04954e

    • SSDEEP

      3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1Q:nCcFA+Mle74/HJDFC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks