General

  • Target

    b366d78ebddbfb29d1c4c376165166c0_NeikiAnalytics.exe

  • Size

    236KB

  • Sample

    240517-f3v1cabb9t

  • MD5

    b366d78ebddbfb29d1c4c376165166c0

  • SHA1

    fbed6b2f5596c3d21fb209916e19df938470d394

  • SHA256

    015c835de0dc690cfda8b75ed9a5b81ad577c3548c1f0050eaabdc82f1b8ce5c

  • SHA512

    18005f60ecd7ec0b613ce4c2d6d06b5ae09bd0d520c1652fad6fb921c162ba7be6a128838c8f50c831962a47164e97691232d1dc2b6842697eb8fb48b4c66fc0

  • SSDEEP

    3072:M726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:J6qSCKzkzPgaM+XorMJ0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Targets

    • Target

      b366d78ebddbfb29d1c4c376165166c0_NeikiAnalytics.exe

    • Size

      236KB

    • MD5

      b366d78ebddbfb29d1c4c376165166c0

    • SHA1

      fbed6b2f5596c3d21fb209916e19df938470d394

    • SHA256

      015c835de0dc690cfda8b75ed9a5b81ad577c3548c1f0050eaabdc82f1b8ce5c

    • SHA512

      18005f60ecd7ec0b613ce4c2d6d06b5ae09bd0d520c1652fad6fb921c162ba7be6a128838c8f50c831962a47164e97691232d1dc2b6842697eb8fb48b4c66fc0

    • SSDEEP

      3072:M726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:J6qSCKzkzPgaM+XorMJ0

    Score
    5/10

MITRE ATT&CK Enterprise v15

Tasks