General
-
Target
2580-14-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
240123-2yaz9scabm
-
MD5
cdcf723e7ab46e4f602f5070a3b605d5
-
SHA1
950d15a9eb429f32f8bd20670ef22ce2641b9a5b
-
SHA256
cf72fff9760a91decf46211a8d7742b3925e6ea748a5a0c5234cb30f2a418b13
-
SHA512
60fcd85acc44c45bbce32ae02323791d69db58134309e97d98262802694451f3ca138c2664f364ccd76e24ba3dbd7450839432fa2bcc456497aa24ba234eaac9
-
SSDEEP
3072:XZXjHb3rpCqH3BuX38Inw2SVtL8V5eq+RuU:JXjHb3rpCqH3Ba38IEVtL83+M
Behavioral task
behavioral1
Sample
2580-14-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2580-14-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.aksumer.com - Port:
21 - Username:
aksumerc - Password:
211116.kS*-
Targets
-
-
Target
2580-14-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
cdcf723e7ab46e4f602f5070a3b605d5
-
SHA1
950d15a9eb429f32f8bd20670ef22ce2641b9a5b
-
SHA256
cf72fff9760a91decf46211a8d7742b3925e6ea748a5a0c5234cb30f2a418b13
-
SHA512
60fcd85acc44c45bbce32ae02323791d69db58134309e97d98262802694451f3ca138c2664f364ccd76e24ba3dbd7450839432fa2bcc456497aa24ba234eaac9
-
SSDEEP
3072:XZXjHb3rpCqH3BuX38Inw2SVtL8V5eq+RuU:JXjHb3rpCqH3Ba38IEVtL83+M
Score1/10 -