General

  • Target

    2696-20-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • Sample

    240911-g82kraxfla

  • MD5

    019f56d0dd9a562b423e36b64738b4ab

  • SHA1

    a0734580e6f0a02cbae1ad7c1a99108da2f2f464

  • SHA256

    bdb7c319e38dbd18b76e3807dbc631ebac65bac9eae56f4504052db8ebf2dd52

  • SHA512

    1d45fc1a23d18ef73b8d50ff189fda9e83b0aca8ac8e78ce75d11f763a0f9002dd60ea5a5a78c29c8aa9f6610f8a0d46d8776a2c6806c40bc35b208bb08e29f9

  • SSDEEP

    3072:SW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:X1X0w8AUsSiO0g5dBw0GbsES

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Targets

    • Target

      2696-20-0x0000000000400000-0x0000000000440000-memory.dmp

    • Size

      256KB

    • MD5

      019f56d0dd9a562b423e36b64738b4ab

    • SHA1

      a0734580e6f0a02cbae1ad7c1a99108da2f2f464

    • SHA256

      bdb7c319e38dbd18b76e3807dbc631ebac65bac9eae56f4504052db8ebf2dd52

    • SHA512

      1d45fc1a23d18ef73b8d50ff189fda9e83b0aca8ac8e78ce75d11f763a0f9002dd60ea5a5a78c29c8aa9f6610f8a0d46d8776a2c6806c40bc35b208bb08e29f9

    • SSDEEP

      3072:SW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM5:X1X0w8AUsSiO0g5dBw0GbsES

    Score
    1/10

MITRE ATT&CK Matrix

Tasks