General

  • Target

    2544-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • Sample

    231208-sjhbcsccd6

  • MD5

    34403f3323aede33add07929d44e3864

  • SHA1

    4c263381aa480a4bb0a9bc0f63e5ddeca65a8f13

  • SHA256

    0047ed849929e320455436fe2201a25f9f929b0de27a1dc1ff5943f979b157b8

  • SHA512

    f04fbd14b221fde6bb6eef61a86375a2d79b80b43da8d11e0d754681b4d7c337beb4cee895b585ac234e83765e9b955ed82e5ccfa7acf29ce75ac9f92de4493c

  • SSDEEP

    3072:e4U18kKWi2NvzWygPc11THOYyQ01ITe5oiagNOMXS/:eT8kKWi2p3gEX7OYyQvT3gw

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    198.23.221.13
  • Port:
    587
  • Username:
    uzo@homerstreetgy.cf
  • Password:
    admin2
  • Email To:
    uzo@homerstreetgy.cf

Targets

    • Target

      2544-12-0x0000000000400000-0x0000000000442000-memory.dmp

    • Size

      264KB

    • MD5

      34403f3323aede33add07929d44e3864

    • SHA1

      4c263381aa480a4bb0a9bc0f63e5ddeca65a8f13

    • SHA256

      0047ed849929e320455436fe2201a25f9f929b0de27a1dc1ff5943f979b157b8

    • SHA512

      f04fbd14b221fde6bb6eef61a86375a2d79b80b43da8d11e0d754681b4d7c337beb4cee895b585ac234e83765e9b955ed82e5ccfa7acf29ce75ac9f92de4493c

    • SSDEEP

      3072:e4U18kKWi2NvzWygPc11THOYyQ01ITe5oiagNOMXS/:eT8kKWi2p3gEX7OYyQvT3gw

    Score
    1/10

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.