General
-
Target
2220-6-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
Sample
231206-vra85aah59
-
MD5
d2396f91fbb41ad8bc95b4bf9850d200
-
SHA1
349e689f1825f7d828bb084627a44e7d87b78a85
-
SHA256
a9b92aa7f2733bea14e617e2be269bc879050084c70e1cb4930c08e2d2adfb64
-
SHA512
08b491d83a23f3395a00444ab0f7619c8cef6710a321dbbf95cb1fbaf1c2385c6f76b1de089e74351b4229607dfbac313c5c48e2d459980e2707b8513379030b
-
SSDEEP
3072:W23f3RPokosYtKDPLCkTyVJay5lI9Kgvk/9ATnxzZg4E0P1LK6LW5rOcogO:VhokosYpkujIm4E417LNct
Behavioral task
behavioral1
Sample
2220-6-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2220-6-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mydevelopmentstory.com - Port:
21 - Username:
[email protected] - Password:
ENugu@042EN
Targets
-
-
Target
2220-6-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
d2396f91fbb41ad8bc95b4bf9850d200
-
SHA1
349e689f1825f7d828bb084627a44e7d87b78a85
-
SHA256
a9b92aa7f2733bea14e617e2be269bc879050084c70e1cb4930c08e2d2adfb64
-
SHA512
08b491d83a23f3395a00444ab0f7619c8cef6710a321dbbf95cb1fbaf1c2385c6f76b1de089e74351b4229607dfbac313c5c48e2d459980e2707b8513379030b
-
SSDEEP
3072:W23f3RPokosYtKDPLCkTyVJay5lI9Kgvk/9ATnxzZg4E0P1LK6LW5rOcogO:VhokosYpkujIm4E417LNct
Score1/10 -