General
-
Target
2696-20-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
240911-g82kraxfla
-
MD5
019f56d0dd9a562b423e36b64738b4ab
-
SHA1
a0734580e6f0a02cbae1ad7c1a99108da2f2f464
-
SHA256
bdb7c319e38dbd18b76e3807dbc631ebac65bac9eae56f4504052db8ebf2dd52
-
SHA512
1d45fc1a23d18ef73b8d50ff189fda9e83b0aca8ac8e78ce75d11f763a0f9002dd60ea5a5a78c29c8aa9f6610f8a0d46d8776a2c6806c40bc35b208bb08e29f9
-
SSDEEP
3072:SW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:X1X0w8AUsSiO0g5dBw0GbsES
Behavioral task
behavioral1
Sample
2696-20-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2696-20-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Targets
-
-
Target
2696-20-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
019f56d0dd9a562b423e36b64738b4ab
-
SHA1
a0734580e6f0a02cbae1ad7c1a99108da2f2f464
-
SHA256
bdb7c319e38dbd18b76e3807dbc631ebac65bac9eae56f4504052db8ebf2dd52
-
SHA512
1d45fc1a23d18ef73b8d50ff189fda9e83b0aca8ac8e78ce75d11f763a0f9002dd60ea5a5a78c29c8aa9f6610f8a0d46d8776a2c6806c40bc35b208bb08e29f9
-
SSDEEP
3072:SW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:X1X0w8AUsSiO0g5dBw0GbsES
Score1/10 -