General

  • Target

    2976-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • Sample

    240522-rt6k9sed44

  • MD5

    bb4232b10a40b82b385839c08195b2cb

  • SHA1

    661024825868949772fd539f24366f22a7bccb6c

  • SHA256

    c27a96fa39a2c28a3bb231e95c2b93b1ff9733b7f4a18eea0b08a53f99c44f2c

  • SHA512

    e00afe2ba00fa7f54f8a1a4b919cb1771bd94d0bfcd91bc094e27286eb514255774c3565a4d159e6a0e52fd7873fa72841c0478faeaa34ba313f86c8b2fb1150

  • SSDEEP

    3072:r+YCG+5txN5Uu/AG4M45sB6tFL/oNZxnNetZj5oe/N0/qC:KYE5txN5Uu145smFLwVnNetZKsNG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Q6]7rLSD*gU2

Targets

    • Target

      2976-13-0x0000000000400000-0x0000000000442000-memory.dmp

    • Size

      264KB

    • MD5

      bb4232b10a40b82b385839c08195b2cb

    • SHA1

      661024825868949772fd539f24366f22a7bccb6c

    • SHA256

      c27a96fa39a2c28a3bb231e95c2b93b1ff9733b7f4a18eea0b08a53f99c44f2c

    • SHA512

      e00afe2ba00fa7f54f8a1a4b919cb1771bd94d0bfcd91bc094e27286eb514255774c3565a4d159e6a0e52fd7873fa72841c0478faeaa34ba313f86c8b2fb1150

    • SSDEEP

      3072:r+YCG+5txN5Uu/AG4M45sB6tFL/oNZxnNetZj5oe/N0/qC:KYE5txN5Uu145smFLwVnNetZKsNG

    Score
    1/10

MITRE ATT&CK Matrix

Tasks