General

  • Target

    2364-18-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • Sample

    240910-frffhszarh

  • MD5

    ab3bcc9307ee61d72ae8aa7d8ac0417a

  • SHA1

    450c33b41f17cdcdcc6b05284258315e2cab70fd

  • SHA256

    b032a79e85c866d84cbe3a8b58fd7204efcaa8bc03bda3f6f7d1578d6b5f4eed

  • SHA512

    b87e774bfe6f0ef2cdc5cc1475d8ffdfdeadfef72ce82662a2d7fce5fabfd063e8d9c2cd838a02b2d7e592944c1489d46cb2674658425ecb67849848ff9f036d

  • SSDEEP

    3072:lW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:c1X0w8AUsSiO0g5dBw0GbsES

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Targets

    • Target

      2364-18-0x0000000000400000-0x0000000000440000-memory.dmp

    • Size

      256KB

    • MD5

      ab3bcc9307ee61d72ae8aa7d8ac0417a

    • SHA1

      450c33b41f17cdcdcc6b05284258315e2cab70fd

    • SHA256

      b032a79e85c866d84cbe3a8b58fd7204efcaa8bc03bda3f6f7d1578d6b5f4eed

    • SHA512

      b87e774bfe6f0ef2cdc5cc1475d8ffdfdeadfef72ce82662a2d7fce5fabfd063e8d9c2cd838a02b2d7e592944c1489d46cb2674658425ecb67849848ff9f036d

    • SSDEEP

      3072:lW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:c1X0w8AUsSiO0g5dBw0GbsES

    Score
    1/10

MITRE ATT&CK Matrix

Tasks