General
-
Target
2616-11-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
Sample
240521-nys9ysce7t
-
MD5
a7dd37ef2240a79cbec2e9bf6332de84
-
SHA1
eed772865b8181f79557fbdb53c3c67268761854
-
SHA256
69b920467dc51596ae6b3609ee03c62197234dc5d46b80da2f06361ab66702ea
-
SHA512
b9bd16df00a7ee7d4e1f6813b6b08608bd2b459cac74a558229182ddc7423ca6069a1d2f7f8d7530f9b7f63148428ce838d6cacc6bad4036b59f713b5b9a25d4
-
SSDEEP
1536:6/cPSvuOAPyNJ2t1Loz6LpoAksQ+8uNLkOGXrYRq+6RAoFg5RhRvAOwno+rjtDB0:4cq0AC1LLa0QNu7EtsRvfxEN4NB
Behavioral task
behavioral1
Sample
2616-11-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2616-11-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.corpsa.net - Port:
21 - Username:
[email protected] - Password:
-E~O8rekW5UT
Targets
-
-
Target
2616-11-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
MD5
a7dd37ef2240a79cbec2e9bf6332de84
-
SHA1
eed772865b8181f79557fbdb53c3c67268761854
-
SHA256
69b920467dc51596ae6b3609ee03c62197234dc5d46b80da2f06361ab66702ea
-
SHA512
b9bd16df00a7ee7d4e1f6813b6b08608bd2b459cac74a558229182ddc7423ca6069a1d2f7f8d7530f9b7f63148428ce838d6cacc6bad4036b59f713b5b9a25d4
-
SSDEEP
1536:6/cPSvuOAPyNJ2t1Loz6LpoAksQ+8uNLkOGXrYRq+6RAoFg5RhRvAOwno+rjtDB0:4cq0AC1LLa0QNu7EtsRvfxEN4NB
Score1/10 -