General

  • Target

    2792-38-0x0000000000470000-0x00000000014D2000-memory.dmp

  • Size

    16.4MB

  • Sample

    240522-wtb4wabe78

  • MD5

    336cfd5707ecda4a21d4b6d5f57b74f9

  • SHA1

    974e741b6b9ea7517ddaa46fab58044c097fdd48

  • SHA256

    bebd297d72cf6ad8e99b2a6d0a0f904397cd3c944d95a6be7fb72bd4d8048c2e

  • SHA512

    4ab2cbab493ae821c5d9da86efe67c923620593f6a5089e58074f3bf1822db0140edcc7fa4a0d2a7b6b809d369fdd61f0ea89c2ae777b1cb7ce8d79292f940bc

  • SSDEEP

    3072:vZcZHBVR9RV5GYyH1UaZKF9DbwI+tFvcNO+FPq5OXrpUHUm:2ZHBVR9R3GYyH1k9ghhcNVFPzpi

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.instantprint.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playmen123#@

Targets

    • Target

      2792-38-0x0000000000470000-0x00000000014D2000-memory.dmp

    • Size

      16.4MB

    • MD5

      336cfd5707ecda4a21d4b6d5f57b74f9

    • SHA1

      974e741b6b9ea7517ddaa46fab58044c097fdd48

    • SHA256

      bebd297d72cf6ad8e99b2a6d0a0f904397cd3c944d95a6be7fb72bd4d8048c2e

    • SHA512

      4ab2cbab493ae821c5d9da86efe67c923620593f6a5089e58074f3bf1822db0140edcc7fa4a0d2a7b6b809d369fdd61f0ea89c2ae777b1cb7ce8d79292f940bc

    • SSDEEP

      3072:vZcZHBVR9RV5GYyH1UaZKF9DbwI+tFvcNO+FPq5OXrpUHUm:2ZHBVR9R3GYyH1k9ghhcNVFPzpi

    Score
    1/10

MITRE ATT&CK Matrix

Tasks