General
-
Target
2792-38-0x0000000000470000-0x00000000014D2000-memory.dmp
-
Size
16.4MB
-
Sample
240522-wtb4wabe78
-
MD5
336cfd5707ecda4a21d4b6d5f57b74f9
-
SHA1
974e741b6b9ea7517ddaa46fab58044c097fdd48
-
SHA256
bebd297d72cf6ad8e99b2a6d0a0f904397cd3c944d95a6be7fb72bd4d8048c2e
-
SHA512
4ab2cbab493ae821c5d9da86efe67c923620593f6a5089e58074f3bf1822db0140edcc7fa4a0d2a7b6b809d369fdd61f0ea89c2ae777b1cb7ce8d79292f940bc
-
SSDEEP
3072:vZcZHBVR9RV5GYyH1UaZKF9DbwI+tFvcNO+FPq5OXrpUHUm:2ZHBVR9R3GYyH1k9ghhcNVFPzpi
Behavioral task
behavioral1
Sample
2792-38-0x0000000000470000-0x00000000014D2000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2792-38-0x0000000000470000-0x00000000014D2000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.instantprint.ro - Port:
21 - Username:
[email protected] - Password:
playmen123#@
Targets
-
-
Target
2792-38-0x0000000000470000-0x00000000014D2000-memory.dmp
-
Size
16.4MB
-
MD5
336cfd5707ecda4a21d4b6d5f57b74f9
-
SHA1
974e741b6b9ea7517ddaa46fab58044c097fdd48
-
SHA256
bebd297d72cf6ad8e99b2a6d0a0f904397cd3c944d95a6be7fb72bd4d8048c2e
-
SHA512
4ab2cbab493ae821c5d9da86efe67c923620593f6a5089e58074f3bf1822db0140edcc7fa4a0d2a7b6b809d369fdd61f0ea89c2ae777b1cb7ce8d79292f940bc
-
SSDEEP
3072:vZcZHBVR9RV5GYyH1UaZKF9DbwI+tFvcNO+FPq5OXrpUHUm:2ZHBVR9R3GYyH1k9ghhcNVFPzpi
Score1/10 -