General
-
Target
2612-11-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
Sample
240522-qea1dace58
-
MD5
911bb2d79f8617d65f899021a06a335b
-
SHA1
d58678d5a47d8623d3e9b32ff0d7ee5d68791881
-
SHA256
10971801094189df2b4073c0cee63fa7ead34e3c4e9788c081ca943a45df73be
-
SHA512
683c2525592cfba711bb42950709a097233ca13e8a36ebd3b0379a4e2cc45f689b45ee0067559c490527de933f6d7073e51ac5d4440d148caf83c0d43aa0368f
-
SSDEEP
3072:HdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwX:9vDPrfcwcwcusW9nPCU
Behavioral task
behavioral1
Sample
2612-11-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2612-11-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.fosna.net - Port:
21 - Username:
[email protected] - Password:
(=8fPSH$KO_!
Targets
-
-
Target
2612-11-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
MD5
911bb2d79f8617d65f899021a06a335b
-
SHA1
d58678d5a47d8623d3e9b32ff0d7ee5d68791881
-
SHA256
10971801094189df2b4073c0cee63fa7ead34e3c4e9788c081ca943a45df73be
-
SHA512
683c2525592cfba711bb42950709a097233ca13e8a36ebd3b0379a4e2cc45f689b45ee0067559c490527de933f6d7073e51ac5d4440d148caf83c0d43aa0368f
-
SSDEEP
3072:HdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwX:9vDPrfcwcwcusW9nPCU
Score1/10 -