General
-
Target
1880-46-0x000000006F190000-0x00000000701F2000-memory.dmp
-
Size
16.4MB
-
Sample
231211-zbt4hsgghn
-
MD5
7a385d812dbf270728654857dea8173c
-
SHA1
081a7c9eb3cc1eb95879ff0383473b530c1c44ba
-
SHA256
2c926b965f9b26b6d5ec36d2d21d1f0836ec0016398f393f92f6e37742735e6e
-
SHA512
46a1f84b78d616b06242b796945b56eda6471dc55894eb88ec0e9a244e004d022b206c6f511c53ef904aa216dc54f92a0cad659265464ee241ba041eb103da45
-
SSDEEP
3072:Tu7Xjnbe9Q43OAL+VbQ8bM+6Wv5u1jVqf:67Xjnbe9Q43OAL+V1bMjWAjc
Behavioral task
behavioral1
Sample
1880-46-0x000000006F190000-0x00000000701F2000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
1880-46-0x000000006F190000-0x00000000701F2000-memory.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.cefin.bg - Port:
21 - Username:
[email protected] - Password:
#UuXy?6cIbL+
Targets
-
-
Target
1880-46-0x000000006F190000-0x00000000701F2000-memory.dmp
-
Size
16.4MB
-
MD5
7a385d812dbf270728654857dea8173c
-
SHA1
081a7c9eb3cc1eb95879ff0383473b530c1c44ba
-
SHA256
2c926b965f9b26b6d5ec36d2d21d1f0836ec0016398f393f92f6e37742735e6e
-
SHA512
46a1f84b78d616b06242b796945b56eda6471dc55894eb88ec0e9a244e004d022b206c6f511c53ef904aa216dc54f92a0cad659265464ee241ba041eb103da45
-
SSDEEP
3072:Tu7Xjnbe9Q43OAL+VbQ8bM+6Wv5u1jVqf:67Xjnbe9Q43OAL+V1bMjWAjc
Score1/10 -