General
-
Target
1328-19-0x00000000723E0000-0x0000000073442000-memory.dmp
-
Size
16.4MB
-
Sample
231204-ryjx3abg2v
-
MD5
380c9234ab26a4b8a7b8cf01eb820e78
-
SHA1
507022fa772c3f57a3c80e54f43c358e963d267f
-
SHA256
da706ce166099dd92da48d1818a98ce32757f0e19e4d8968ed1b6bcbcae5c423
-
SHA512
8257926c808d967efb83b3e4734e7ce0080b6a7bbde2f74b240fe80842d85000d2d9f38c93f84b45e27bcf53d986d01c9c40c8831a6f3fae8edf142e151334bd
-
SSDEEP
3072:iTzO3OhMXXW+dc6+xEL8ooBWMG0FHDWHfE5TftXY0:im+hMXGyc6+xEL8ooUMTafkBX
Behavioral task
behavioral1
Sample
1328-19-0x00000000723E0000-0x0000000073442000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
1328-19-0x00000000723E0000-0x0000000073442000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.siscop.com.co - Port:
21 - Username:
[email protected] - Password:
+5s48Ia2&-(t
Targets
-
-
Target
1328-19-0x00000000723E0000-0x0000000073442000-memory.dmp
-
Size
16.4MB
-
MD5
380c9234ab26a4b8a7b8cf01eb820e78
-
SHA1
507022fa772c3f57a3c80e54f43c358e963d267f
-
SHA256
da706ce166099dd92da48d1818a98ce32757f0e19e4d8968ed1b6bcbcae5c423
-
SHA512
8257926c808d967efb83b3e4734e7ce0080b6a7bbde2f74b240fe80842d85000d2d9f38c93f84b45e27bcf53d986d01c9c40c8831a6f3fae8edf142e151334bd
-
SSDEEP
3072:iTzO3OhMXXW+dc6+xEL8ooBWMG0FHDWHfE5TftXY0:im+hMXGyc6+xEL8ooUMTafkBX
Score1/10 -