General

  • Target

    2080-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • Sample

    240429-lhx7vsfc92

  • MD5

    8bee5eda65ee2bad93042e01a64d5fdf

  • SHA1

    050ee0004b74d5ff3a2f67d57a9ac4d0a40d041a

  • SHA256

    a714f07c01362104b99a66be2f71247dd29ed80e46327c400189a39321fe32d3

  • SHA512

    bde784ea7c096b307059c155af8cd8fce185bb7a24d49a81e8e00677a2fa84e76a9acaff25e502de10a6b17abac8355feff13cf2a8c3957caea528bc4574d7c0

  • SSDEEP

    3072:0WW1JlxVwZrJJzbjb56E9kxx/mU0bToK5odWSopV:0WW1JlxVwZrJJzbh6w4x+EJWSQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.quoctoan.vn
  • Port:
    587
  • Username:
    long_xnk@quoctoan.vn
  • Password:
    bGMJNaGYNTLC
  • Email To:
    dclarkson007@protonmail.com

Targets

    • Target

      2080-13-0x0000000000400000-0x0000000000440000-memory.dmp

    • Size

      256KB

    • MD5

      8bee5eda65ee2bad93042e01a64d5fdf

    • SHA1

      050ee0004b74d5ff3a2f67d57a9ac4d0a40d041a

    • SHA256

      a714f07c01362104b99a66be2f71247dd29ed80e46327c400189a39321fe32d3

    • SHA512

      bde784ea7c096b307059c155af8cd8fce185bb7a24d49a81e8e00677a2fa84e76a9acaff25e502de10a6b17abac8355feff13cf2a8c3957caea528bc4574d7c0

    • SSDEEP

      3072:0WW1JlxVwZrJJzbjb56E9kxx/mU0bToK5odWSopV:0WW1JlxVwZrJJzbh6w4x+EJWSQ

    Score
    1/10

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.