General

  • Target

    2784-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • Sample

    240521-n15qrscf7x

  • MD5

    056b46fd168fa13261511ffb13ee4c5e

  • SHA1

    356a89ca659a4624b683dc17417215b0013d6717

  • SHA256

    ccee6b29c2e61be7564380ebafcfcbd5782dc35e6c1ab03358252d0452870ffa

  • SHA512

    fbbcdf6ba011f0e628ef1d1a649462e1d663f70bf5a79a964f90de580e03aa8320fd4e25843ae0765b0b134817a69a9d70b7cbbd8d1a1d0cea09146b41e9a812

  • SSDEEP

    3072:aQYWwEgsgSh73KAG9ifNZG04jGD5/xh7YXaov:7YWwEgsgSh73KL9ifm04yVb7B

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Cgn+Udqt0F%y

Targets

    • Target

      2784-12-0x0000000000400000-0x0000000000442000-memory.dmp

    • Size

      264KB

    • MD5

      056b46fd168fa13261511ffb13ee4c5e

    • SHA1

      356a89ca659a4624b683dc17417215b0013d6717

    • SHA256

      ccee6b29c2e61be7564380ebafcfcbd5782dc35e6c1ab03358252d0452870ffa

    • SHA512

      fbbcdf6ba011f0e628ef1d1a649462e1d663f70bf5a79a964f90de580e03aa8320fd4e25843ae0765b0b134817a69a9d70b7cbbd8d1a1d0cea09146b41e9a812

    • SSDEEP

      3072:aQYWwEgsgSh73KAG9ifNZG04jGD5/xh7YXaov:7YWwEgsgSh73KL9ifm04yVb7B

    Score
    1/10

MITRE ATT&CK Matrix

Tasks