General
-
Target
2004-68-0x0000000000400000-0x0000000000615000-memory.dmp
-
Size
2.1MB
-
Sample
230403-gxxsesdb57
-
MD5
b359538b53e5cd7ea7e5eab32fa5369c
-
SHA1
ee35397a56898fa379c555f298f1dcf1c6ac8f69
-
SHA256
314879d54d02b6dda878f8d0c18beb4aa1a944a5b0ae70e6ca8733ff2797740e
-
SHA512
bfecd9e7a5069bb640e46578b2c7b57cc9e17bbe468842017bb3c56b3e3529371575b410b8ec88cf65b717807748089665f6a049143c16714018e8da7ecee5ae
-
SSDEEP
3072:yOYIdrXQPLHRf1I2gfuxawgfAVr38HW9KDKc10klqa9G+Y:xXQPLxdnFswbr3824xckV
Behavioral task
behavioral1
Sample
2004-68-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2004-68-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.homesteadgroove.com - Port:
21 - Username:
[email protected] - Password:
430M=DwOtIfm
Targets
-
-
Target
2004-68-0x0000000000400000-0x0000000000615000-memory.dmp
-
Size
2.1MB
-
MD5
b359538b53e5cd7ea7e5eab32fa5369c
-
SHA1
ee35397a56898fa379c555f298f1dcf1c6ac8f69
-
SHA256
314879d54d02b6dda878f8d0c18beb4aa1a944a5b0ae70e6ca8733ff2797740e
-
SHA512
bfecd9e7a5069bb640e46578b2c7b57cc9e17bbe468842017bb3c56b3e3529371575b410b8ec88cf65b717807748089665f6a049143c16714018e8da7ecee5ae
-
SSDEEP
3072:yOYIdrXQPLHRf1I2gfuxawgfAVr38HW9KDKc10klqa9G+Y:xXQPLxdnFswbr3824xckV
Score1/10 -