General

  • Target

    2808-19-0x0000000000610000-0x0000000001672000-memory.dmp

  • Size

    16.4MB

  • Sample

    240522-wtyb4sbf35

  • MD5

    16b4a51199bdd67c1fd37da6092060a5

  • SHA1

    d387e1253e1b2e6fbc5a463a5ba5a82624bbb934

  • SHA256

    d65f2dcc9a2665bf0911d3b066994e193fac24e8655aef04ce451e8b6ee70ada

  • SHA512

    5679f75c79fcee57b580c0106a4c06ecd99f25e8bbc31abe6b08a65b881608c536ad9f0c69dd19e3a06c8275ea83df59d14a08f1d4d0ddf83eb567811b9e236b

  • SSDEEP

    3072:3boW+m+24tpCXRJAKT0zZ0XkH85GxC5RPBLF0Ah:EW+m+2+CXRJAKUMz5GxaLqA

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.piny.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Targets

    • Target

      2808-19-0x0000000000610000-0x0000000001672000-memory.dmp

    • Size

      16.4MB

    • MD5

      16b4a51199bdd67c1fd37da6092060a5

    • SHA1

      d387e1253e1b2e6fbc5a463a5ba5a82624bbb934

    • SHA256

      d65f2dcc9a2665bf0911d3b066994e193fac24e8655aef04ce451e8b6ee70ada

    • SHA512

      5679f75c79fcee57b580c0106a4c06ecd99f25e8bbc31abe6b08a65b881608c536ad9f0c69dd19e3a06c8275ea83df59d14a08f1d4d0ddf83eb567811b9e236b

    • SSDEEP

      3072:3boW+m+24tpCXRJAKT0zZ0XkH85GxC5RPBLF0Ah:EW+m+2+CXRJAKUMz5GxaLqA

    Score
    1/10

MITRE ATT&CK Matrix

Tasks