General
-
Target
2632-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231211-taqf2sbbgn
-
MD5
8acc8e29ca7112256a92acfbe84e6608
-
SHA1
22ce6d5afd24aeaae0f71cf7ee156404db38b0e5
-
SHA256
6a58af9b4bbe1d7f3578607dc31f77a16810a5c79ee3e69ce2b9b0b2b18819a9
-
SHA512
fbb0be4a16cc849acdec9d31cbd0e45804050e5144ab72d7c6d70b374f597face24952792afff5d5b9f42231329b174d2f4cc3eb1278a22c1a36d26ff1e388fc
-
SSDEEP
3072:aNP81J6tpdRtlPXzRrmWenUPdzyq8rSC5mLz5Kln:MLtpdRtlPFmWenKFBWSp5Wn
Behavioral task
behavioral1
Sample
2632-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
2632-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.mercuresurabaya.com - Port:
21 - Username:
[email protected] - Password:
2ffPmXZ_5A{G
Targets
-
-
Target
2632-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
8acc8e29ca7112256a92acfbe84e6608
-
SHA1
22ce6d5afd24aeaae0f71cf7ee156404db38b0e5
-
SHA256
6a58af9b4bbe1d7f3578607dc31f77a16810a5c79ee3e69ce2b9b0b2b18819a9
-
SHA512
fbb0be4a16cc849acdec9d31cbd0e45804050e5144ab72d7c6d70b374f597face24952792afff5d5b9f42231329b174d2f4cc3eb1278a22c1a36d26ff1e388fc
-
SSDEEP
3072:aNP81J6tpdRtlPXzRrmWenUPdzyq8rSC5mLz5Kln:MLtpdRtlPFmWenKFBWSp5Wn
Score1/10 -