General
-
Target
2088-14-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240909-p1r1caycpn
-
MD5
bf4ff69ca0f74c7f191cd97d247833ce
-
SHA1
ae24c84fd15d133a2868cdadf651d08d8dffe71c
-
SHA256
1e3b0a566c417baf993b89b1b87685994e68625cd11d6efb36ad0f15a8613aeb
-
SHA512
dda070a724ce297771da601d98c645bb0368fb0ed446b1e35af7d28248b6fe1157118eb58b6e52b2914fad097d5b9a2d01cefb3780e21316b59e0d3f6f9b584e
-
SSDEEP
3072:D726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:+6qSCKzkzPgaM+XorMJ0
Behavioral task
behavioral1
Sample
2088-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2088-14-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ultraflex.com.mx - Port:
21 - Username:
[email protected] - Password:
Jgj8-p4Z]a1b
Targets
-
-
Target
2088-14-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
bf4ff69ca0f74c7f191cd97d247833ce
-
SHA1
ae24c84fd15d133a2868cdadf651d08d8dffe71c
-
SHA256
1e3b0a566c417baf993b89b1b87685994e68625cd11d6efb36ad0f15a8613aeb
-
SHA512
dda070a724ce297771da601d98c645bb0368fb0ed446b1e35af7d28248b6fe1157118eb58b6e52b2914fad097d5b9a2d01cefb3780e21316b59e0d3f6f9b584e
-
SSDEEP
3072:D726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:+6qSCKzkzPgaM+XorMJ0
Score1/10 -