General
-
Target
1516-1151-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
Sample
230818-qnnylabd2x
-
MD5
7e5ff2dfe09da09128aec85b9d4eeba6
-
SHA1
03816a576c5acf729c0267e503a2b78f6411a575
-
SHA256
023aa3c43e74a9b488fd6dcceeba88d5e9ede8bcb9d587864ce7c0f5fc1b013b
-
SHA512
260c77054abfed46cd9463c2c21e7db661c4fb5941154202cfc1d858224b54ab0a38a98bd78f17be35c04518146c10120b0ce2923f659ad17acfb698815c0d9c
-
SSDEEP
3072:q3aCmYcTJR1xhYzkkWWflGB+vh3DSp0fdahRSzOlF728h:YcNrXc1W7B4kWCgzEx
Behavioral task
behavioral1
Sample
1516-1151-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1516-1151-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.svetigeorgije.co.rs - Port:
21 - Username:
[email protected] - Password:
4c5H&b2whkD9
Targets
-
-
Target
1516-1151-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
7e5ff2dfe09da09128aec85b9d4eeba6
-
SHA1
03816a576c5acf729c0267e503a2b78f6411a575
-
SHA256
023aa3c43e74a9b488fd6dcceeba88d5e9ede8bcb9d587864ce7c0f5fc1b013b
-
SHA512
260c77054abfed46cd9463c2c21e7db661c4fb5941154202cfc1d858224b54ab0a38a98bd78f17be35c04518146c10120b0ce2923f659ad17acfb698815c0d9c
-
SSDEEP
3072:q3aCmYcTJR1xhYzkkWWflGB+vh3DSp0fdahRSzOlF728h:YcNrXc1W7B4kWCgzEx
Score1/10 -