General
-
Target
2808-19-0x0000000000610000-0x0000000001672000-memory.dmp
-
Size
16.4MB
-
Sample
240522-wtyb4sbf35
-
MD5
16b4a51199bdd67c1fd37da6092060a5
-
SHA1
d387e1253e1b2e6fbc5a463a5ba5a82624bbb934
-
SHA256
d65f2dcc9a2665bf0911d3b066994e193fac24e8655aef04ce451e8b6ee70ada
-
SHA512
5679f75c79fcee57b580c0106a4c06ecd99f25e8bbc31abe6b08a65b881608c536ad9f0c69dd19e3a06c8275ea83df59d14a08f1d4d0ddf83eb567811b9e236b
-
SSDEEP
3072:3boW+m+24tpCXRJAKT0zZ0XkH85GxC5RPBLF0Ah:EW+m+2+CXRJAKUMz5GxaLqA
Behavioral task
behavioral1
Sample
2808-19-0x0000000000610000-0x0000000001672000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2808-19-0x0000000000610000-0x0000000001672000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.piny.ro - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Targets
-
-
Target
2808-19-0x0000000000610000-0x0000000001672000-memory.dmp
-
Size
16.4MB
-
MD5
16b4a51199bdd67c1fd37da6092060a5
-
SHA1
d387e1253e1b2e6fbc5a463a5ba5a82624bbb934
-
SHA256
d65f2dcc9a2665bf0911d3b066994e193fac24e8655aef04ce451e8b6ee70ada
-
SHA512
5679f75c79fcee57b580c0106a4c06ecd99f25e8bbc31abe6b08a65b881608c536ad9f0c69dd19e3a06c8275ea83df59d14a08f1d4d0ddf83eb567811b9e236b
-
SSDEEP
3072:3boW+m+24tpCXRJAKT0zZ0XkH85GxC5RPBLF0Ah:EW+m+2+CXRJAKUMz5GxaLqA
Score1/10 -