General
-
Target
2984-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240521-n2sgtscg53
-
MD5
a7ab9c5ba7323b38b31eaaf73d2e749c
-
SHA1
7ef67f015113b3abd8e47eccb7f4116a5fc22eb7
-
SHA256
089e8478cfcd990a3db1f399f3085b13945416ec310e4ebd8a53088d7371eaf3
-
SHA512
9877b7dec2ab50fa6825a1d5d6f0f13a7f5588f8e36bbb9327ea321bd1a57ce3e17c8588ff29b5feb4117488a9ff827713862d9c5c3850c464e8b29938a9fe4a
-
SSDEEP
3072:WjzKeCuKYYSQkQFC6givQTQ8dJ5M2j1O3AG:+KeCuKYYSQ1E6giITQSb1A
Behavioral task
behavioral1
Sample
2984-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2984-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
u;4z3V.Iir1l
Targets
-
-
Target
2984-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
a7ab9c5ba7323b38b31eaaf73d2e749c
-
SHA1
7ef67f015113b3abd8e47eccb7f4116a5fc22eb7
-
SHA256
089e8478cfcd990a3db1f399f3085b13945416ec310e4ebd8a53088d7371eaf3
-
SHA512
9877b7dec2ab50fa6825a1d5d6f0f13a7f5588f8e36bbb9327ea321bd1a57ce3e17c8588ff29b5feb4117488a9ff827713862d9c5c3850c464e8b29938a9fe4a
-
SSDEEP
3072:WjzKeCuKYYSQkQFC6givQTQ8dJ5M2j1O3AG:+KeCuKYYSQ1E6giITQSb1A
Score1/10 -