General
-
Target
2316-16-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
240806-gq1whavgmd
-
MD5
a754d37607b413d4549f83ef4b954029
-
SHA1
3331b8b613276a595707c586a5b38694e752911c
-
SHA256
b78c0ec4f0687c89707d30944bd4669fec6d71093d4c6cf2e1a833ab5f404bcb
-
SHA512
45003a879d88607d83f945c6ee929f83bc31c15d6d5976ac5e08757c9a8dec2cdf57326e47ae0fcc34672e6c9f4c6d860b6dfde3f2027731ec9a115bf595eb17
-
SSDEEP
3072:RmpZgsw0w8vBgsN6FsPveoIFnA7yF5xGTYVn:wpZgsw0w8vBgsN6mPvlMA2ETg
Behavioral task
behavioral1
Sample
2316-16-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2316-16-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Targets
-
-
Target
2316-16-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
a754d37607b413d4549f83ef4b954029
-
SHA1
3331b8b613276a595707c586a5b38694e752911c
-
SHA256
b78c0ec4f0687c89707d30944bd4669fec6d71093d4c6cf2e1a833ab5f404bcb
-
SHA512
45003a879d88607d83f945c6ee929f83bc31c15d6d5976ac5e08757c9a8dec2cdf57326e47ae0fcc34672e6c9f4c6d860b6dfde3f2027731ec9a115bf595eb17
-
SSDEEP
3072:RmpZgsw0w8vBgsN6FsPveoIFnA7yF5xGTYVn:wpZgsw0w8vBgsN6mPvlMA2ETg
Score1/10 -