General
-
Target
1720-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240406-mhwvgagg89
-
MD5
c09b2aeaa699c8935c031b616673718a
-
SHA1
93b64d32dec4d7647f9e7269e258bdfc36a4053a
-
SHA256
30d698e912addd2ef66b95ba128c36312e974efcbc43d32591d02baee5f4300a
-
SHA512
d88c6ca10df0a7203f793e6f4d94a160c34d0dce075df53a216b77bfd34d9b0ba9b69249da67b57be3f8d1c9a553aeae0e58472221652b3d85b75ad5dc7d861a
-
SSDEEP
3072:WNdbbDRZwjKElYK6WVNcbVBjzp++2Efh53INrHVk:ObbDRZwT7QBjV++18Nj
Behavioral task
behavioral1
Sample
1720-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1720-9-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://80.92.205.47 - Port:
21 - Username:
delizzasuppl - Password:
99EK7bvTZr4zBnwW
Targets
-
-
Target
1720-9-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
c09b2aeaa699c8935c031b616673718a
-
SHA1
93b64d32dec4d7647f9e7269e258bdfc36a4053a
-
SHA256
30d698e912addd2ef66b95ba128c36312e974efcbc43d32591d02baee5f4300a
-
SHA512
d88c6ca10df0a7203f793e6f4d94a160c34d0dce075df53a216b77bfd34d9b0ba9b69249da67b57be3f8d1c9a553aeae0e58472221652b3d85b75ad5dc7d861a
-
SSDEEP
3072:WNdbbDRZwjKElYK6WVNcbVBjzp++2Efh53INrHVk:ObbDRZwT7QBjV++18Nj
Score1/10 -