General
-
Target
2504-116-0x000000006F850000-0x00000000708B2000-memory.dmp
-
Size
16.4MB
-
Sample
231204-r6wltsbh59
-
MD5
84ec6d88c457d416c152aa1943060f40
-
SHA1
445bd676198453bd25999c0545f741713d563113
-
SHA256
2d2cf639a9f852e26b6f0958decad314a80b249a6f5f880ba7e69911d753de01
-
SHA512
c3a406ff0cd86b1d56d180022554db8b961798c0b20489ef20a3f0213da9d085df0803cb1a8061ff6172ed584ff17a5352c1df36a3c05aa4f3a5fce81637a545
-
SSDEEP
3072:uuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKx:7AMw0wI8j/63eBtiZbZJsQdpSxu6K
Behavioral task
behavioral1
Sample
2504-116-0x000000006F850000-0x00000000708B2000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2504-116-0x000000006F850000-0x00000000708B2000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mcmprint.net - Port:
21 - Username:
[email protected] - Password:
pK@7[r0Y?XFT
Targets
-
-
Target
2504-116-0x000000006F850000-0x00000000708B2000-memory.dmp
-
Size
16.4MB
-
MD5
84ec6d88c457d416c152aa1943060f40
-
SHA1
445bd676198453bd25999c0545f741713d563113
-
SHA256
2d2cf639a9f852e26b6f0958decad314a80b249a6f5f880ba7e69911d753de01
-
SHA512
c3a406ff0cd86b1d56d180022554db8b961798c0b20489ef20a3f0213da9d085df0803cb1a8061ff6172ed584ff17a5352c1df36a3c05aa4f3a5fce81637a545
-
SSDEEP
3072:uuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKx:7AMw0wI8j/63eBtiZbZJsQdpSxu6K
Score1/10 -