General

  • Target

    2088-14-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • Sample

    240909-p1r1caycpn

  • MD5

    bf4ff69ca0f74c7f191cd97d247833ce

  • SHA1

    ae24c84fd15d133a2868cdadf651d08d8dffe71c

  • SHA256

    1e3b0a566c417baf993b89b1b87685994e68625cd11d6efb36ad0f15a8613aeb

  • SHA512

    dda070a724ce297771da601d98c645bb0368fb0ed446b1e35af7d28248b6fe1157118eb58b6e52b2914fad097d5b9a2d01cefb3780e21316b59e0d3f6f9b584e

  • SSDEEP

    3072:D726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:+6qSCKzkzPgaM+XorMJ0

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Targets

    • Target

      2088-14-0x0000000000400000-0x0000000000442000-memory.dmp

    • Size

      264KB

    • MD5

      bf4ff69ca0f74c7f191cd97d247833ce

    • SHA1

      ae24c84fd15d133a2868cdadf651d08d8dffe71c

    • SHA256

      1e3b0a566c417baf993b89b1b87685994e68625cd11d6efb36ad0f15a8613aeb

    • SHA512

      dda070a724ce297771da601d98c645bb0368fb0ed446b1e35af7d28248b6fe1157118eb58b6e52b2914fad097d5b9a2d01cefb3780e21316b59e0d3f6f9b584e

    • SSDEEP

      3072:D726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:+6qSCKzkzPgaM+XorMJ0

    Score
    1/10

MITRE ATT&CK Matrix

Tasks