General
-
Target
1384-165-0x000000006F200000-0x0000000070262000-memory.dmp
-
Size
16.4MB
-
Sample
231207-jfss9ahhdk
-
MD5
21580771b5b24f7ce0f9553e87c22d84
-
SHA1
61d241a3f43a6b59e5b96a1cceb45b50bd293759
-
SHA256
ee3602033a44254145674e29652f24164288cef8a8b17fd2bb4950e8762de202
-
SHA512
85bae58785e9d8f213bcd9362b871ea7e0b9d46d33fd434431d6de41935bbe5f6b577d8538b6d2351b4261ba0a48aa5822a13d70e17acad5ba16430fa16ce4cc
-
SSDEEP
3072:UQ8AUgsO3uACf3veXs1TDB7KzJBE5k8V9xka:X8AUgsO3uDf3veXKxKzJBT49C
Behavioral task
behavioral1
Sample
1384-165-0x000000006F200000-0x0000000070262000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1384-165-0x000000006F200000-0x0000000070262000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Targets
-
-
Target
1384-165-0x000000006F200000-0x0000000070262000-memory.dmp
-
Size
16.4MB
-
MD5
21580771b5b24f7ce0f9553e87c22d84
-
SHA1
61d241a3f43a6b59e5b96a1cceb45b50bd293759
-
SHA256
ee3602033a44254145674e29652f24164288cef8a8b17fd2bb4950e8762de202
-
SHA512
85bae58785e9d8f213bcd9362b871ea7e0b9d46d33fd434431d6de41935bbe5f6b577d8538b6d2351b4261ba0a48aa5822a13d70e17acad5ba16430fa16ce4cc
-
SSDEEP
3072:UQ8AUgsO3uACf3veXs1TDB7KzJBE5k8V9xka:X8AUgsO3uDf3veXKxKzJBT49C
Score1/10 -