General
-
Target
540-292-0x000000006FA20000-0x0000000070A82000-memory.dmp
-
Size
16.4MB
-
Sample
231207-qffx1sbb56
-
MD5
abdd87514c16e520e1a741ad972f726a
-
SHA1
538cd1351d5513b470ab3122479deacb4167f2a1
-
SHA256
25054755292895d7d738467d0a700a5a6514524bab6934c9dd4dd28fd761a10e
-
SHA512
5dbb7f7aea2c277567e011f144a4152c4fb122123a1cf22d071ea2be0d6ee7bebc138e66dcb770e6a9fbd256e2fac38f7b5c76e4e12d2a4a83c045aef41569f8
-
SSDEEP
3072:DlIja/OSw0wAWa93/9oWKc96YaLy5fRZjgCz:BIja/OSw0wAWa93/97KJYaLsj/
Behavioral task
behavioral1
Sample
540-292-0x000000006FA20000-0x0000000070A82000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
540-292-0x000000006FA20000-0x0000000070A82000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.omamontaggi.it - Port:
21 - Username:
[email protected] - Password:
pass@A12345@
Targets
-
-
Target
540-292-0x000000006FA20000-0x0000000070A82000-memory.dmp
-
Size
16.4MB
-
MD5
abdd87514c16e520e1a741ad972f726a
-
SHA1
538cd1351d5513b470ab3122479deacb4167f2a1
-
SHA256
25054755292895d7d738467d0a700a5a6514524bab6934c9dd4dd28fd761a10e
-
SHA512
5dbb7f7aea2c277567e011f144a4152c4fb122123a1cf22d071ea2be0d6ee7bebc138e66dcb770e6a9fbd256e2fac38f7b5c76e4e12d2a4a83c045aef41569f8
-
SSDEEP
3072:DlIja/OSw0wAWa93/9oWKc96YaLy5fRZjgCz:BIja/OSw0wAWa93/97KJYaLsj/
Score1/10 -