General
-
Target
2552-15-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240909-j99nvsygnl
-
MD5
7daab1294af0f87e59a6748c522b70c6
-
SHA1
68655ea44c531c3f5d33650f79c9d3dc53f83aea
-
SHA256
a50d53fcdc79c49c2c8e58915bf5727f0ea33546a993b466f6bd34e40769f84d
-
SHA512
38407cce5bea60257ccb40b64b0cd1ba994d1e9b27b9bbad3d6e4f2f7788617411b5af10963adda6ad9d18bc5cb5ede5037ddaf2d21b890b93def75ee0d01877
-
SSDEEP
3072:uPnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKf:uOqu2emeYT6scS/yI4SPEzslK
Behavioral task
behavioral1
Sample
2552-15-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2552-15-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Targets
-
-
Target
2552-15-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
7daab1294af0f87e59a6748c522b70c6
-
SHA1
68655ea44c531c3f5d33650f79c9d3dc53f83aea
-
SHA256
a50d53fcdc79c49c2c8e58915bf5727f0ea33546a993b466f6bd34e40769f84d
-
SHA512
38407cce5bea60257ccb40b64b0cd1ba994d1e9b27b9bbad3d6e4f2f7788617411b5af10963adda6ad9d18bc5cb5ede5037ddaf2d21b890b93def75ee0d01877
-
SSDEEP
3072:uPnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKf:uOqu2emeYT6scS/yI4SPEzslK
Score1/10 -