General

  • Target

    2504-116-0x000000006F850000-0x00000000708B2000-memory.dmp

  • Size

    16.4MB

  • Sample

    231204-r6wltsbh59

  • MD5

    84ec6d88c457d416c152aa1943060f40

  • SHA1

    445bd676198453bd25999c0545f741713d563113

  • SHA256

    2d2cf639a9f852e26b6f0958decad314a80b249a6f5f880ba7e69911d753de01

  • SHA512

    c3a406ff0cd86b1d56d180022554db8b961798c0b20489ef20a3f0213da9d085df0803cb1a8061ff6172ed584ff17a5352c1df36a3c05aa4f3a5fce81637a545

  • SSDEEP

    3072:uuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKx:7AMw0wI8j/63eBtiZbZJsQdpSxu6K

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.mcmprint.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    pK@7[r0Y?XFT

Targets

    • Target

      2504-116-0x000000006F850000-0x00000000708B2000-memory.dmp

    • Size

      16.4MB

    • MD5

      84ec6d88c457d416c152aa1943060f40

    • SHA1

      445bd676198453bd25999c0545f741713d563113

    • SHA256

      2d2cf639a9f852e26b6f0958decad314a80b249a6f5f880ba7e69911d753de01

    • SHA512

      c3a406ff0cd86b1d56d180022554db8b961798c0b20489ef20a3f0213da9d085df0803cb1a8061ff6172ed584ff17a5352c1df36a3c05aa4f3a5fce81637a545

    • SSDEEP

      3072:uuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKx:7AMw0wI8j/63eBtiZbZJsQdpSxu6K

    Score
    1/10

MITRE ATT&CK Matrix

Tasks