General
-
Target
1704-40-0x000000006F520000-0x0000000070582000-memory.dmp
-
Size
16.4MB
-
Sample
231013-z3287scf39
-
MD5
bbf892ac6cf002303dc2a672e37a7d77
-
SHA1
3692a73905d75e91f72e20b3a9f60587e2a24236
-
SHA256
2bd714bc1e017f582dc15c9a406c25b17c3f0ee1e7b0e50309319b06e3f36883
-
SHA512
01e7b8a6e0dfac74ddc04c23d195ecf3d0562d28d47751bfef48027dbdd559b075c4b6465dc279e25bc95d1600cdd2f34956f81ac74ccd1dd1f016008833e2ba
-
SSDEEP
3072:ZVIaM4xAA1LUnHC2FOuIfaK0J1oBP2n0lsZQ:fIaMGF1LeHRIuIfaKS1ePO0W
Behavioral task
behavioral1
Sample
1704-40-0x000000006F520000-0x0000000070582000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1704-40-0x000000006F520000-0x0000000070582000-memory.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.pn-nunukan.go.id - Port:
21 - Username:
[email protected] - Password:
SX&S)XZ}2zjz
Targets
-
-
Target
1704-40-0x000000006F520000-0x0000000070582000-memory.dmp
-
Size
16.4MB
-
MD5
bbf892ac6cf002303dc2a672e37a7d77
-
SHA1
3692a73905d75e91f72e20b3a9f60587e2a24236
-
SHA256
2bd714bc1e017f582dc15c9a406c25b17c3f0ee1e7b0e50309319b06e3f36883
-
SHA512
01e7b8a6e0dfac74ddc04c23d195ecf3d0562d28d47751bfef48027dbdd559b075c4b6465dc279e25bc95d1600cdd2f34956f81ac74ccd1dd1f016008833e2ba
-
SSDEEP
3072:ZVIaM4xAA1LUnHC2FOuIfaK0J1oBP2n0lsZQ:fIaMGF1LeHRIuIfaKS1ePO0W
Score1/10 -