General
-
Target
2416-359-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240509-g51jaahb23
-
MD5
7e995d4a7cba78f5f6e3722f356764bf
-
SHA1
6c1f0d470f7c76dfb435c4bcb202f4efd943a067
-
SHA256
1e7ccbeef0bea4ecea43a2d1bd4f3e247620f2467cd6627c1ca3b4b4bb02b009
-
SHA512
57e53547dcbf697d9796fab79cb26bbe92e1050cb2114007bc1734da6408b75c709590514cf8229d0563b3afa13c9be1d33352bc475db5589da210e808e82135
-
SSDEEP
3072:TkNljwcHLPrnRiQa0gyYEhR5m26Yy5Th7kSY:oNlscHLPrnRiQa07VZd6Ys7X
Behavioral task
behavioral1
Sample
2416-359-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2416-359-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.controlfire.com.mx - Port:
21 - Username:
[email protected] - Password:
0a4XlE=4t8mz
Targets
-
-
Target
2416-359-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
7e995d4a7cba78f5f6e3722f356764bf
-
SHA1
6c1f0d470f7c76dfb435c4bcb202f4efd943a067
-
SHA256
1e7ccbeef0bea4ecea43a2d1bd4f3e247620f2467cd6627c1ca3b4b4bb02b009
-
SHA512
57e53547dcbf697d9796fab79cb26bbe92e1050cb2114007bc1734da6408b75c709590514cf8229d0563b3afa13c9be1d33352bc475db5589da210e808e82135
-
SSDEEP
3072:TkNljwcHLPrnRiQa0gyYEhR5m26Yy5Th7kSY:oNlscHLPrnRiQa07VZd6Ys7X
Score1/10 -