General
-
Target
2576-17-0x0000000072990000-0x00000000739F2000-memory.dmp
-
Size
16.4MB
-
Sample
231205-s7l98ace44
-
MD5
0d07f19afdb5c4d955d9f5fb1e65c31a
-
SHA1
2034bce2cbaed8b2ed28229ec03ccf793e2b7c52
-
SHA256
6111253ec42bff5e47b724088ea90b1bd3832acda6bdcaba101d968a22e3e3f6
-
SHA512
dcdef9a0132aaff18e93b83f1c58391770127ab69b5e520cf91f3a4659fe4a29d6518ea19cdaa614f377de496602774fa2d381da5aba8f974458b8cd6a4217f7
-
SSDEEP
3072:WuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKU:zAMw0wI8j/63eBtiZbZJsQdpSxu6K
Behavioral task
behavioral1
Sample
2576-17-0x0000000072990000-0x00000000739F2000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2576-17-0x0000000072990000-0x00000000739F2000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mcmprint.net - Port:
21 - Username:
[email protected] - Password:
pK@7[r0Y?XFT
Targets
-
-
Target
2576-17-0x0000000072990000-0x00000000739F2000-memory.dmp
-
Size
16.4MB
-
MD5
0d07f19afdb5c4d955d9f5fb1e65c31a
-
SHA1
2034bce2cbaed8b2ed28229ec03ccf793e2b7c52
-
SHA256
6111253ec42bff5e47b724088ea90b1bd3832acda6bdcaba101d968a22e3e3f6
-
SHA512
dcdef9a0132aaff18e93b83f1c58391770127ab69b5e520cf91f3a4659fe4a29d6518ea19cdaa614f377de496602774fa2d381da5aba8f974458b8cd6a4217f7
-
SSDEEP
3072:WuAMw0wI8j/63eBtiKAbZJsQdpv5wnxusDKU:zAMw0wI8j/63eBtiZbZJsQdpSxu6K
Score1/10 -