General
-
Target
2976-8-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240919-p69scazfjj
-
MD5
172cb2d3fe7401ef8b3f83ef0f70cd9d
-
SHA1
1e37648c0bad43db97b8b146c83c4ef3c5936def
-
SHA256
20a9c3091cb0d7c7bf8133f4f483f8010febeed5a6b8af00d1c10aa4142895e3
-
SHA512
077ac92d7901d5855d55cf01d747ac952e94284a67fc1abdd630f14b9319948124553cfc296f3b453f2f27cb1692d2444675e5a648033727596c358335bfadbe
-
SSDEEP
3072:jVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/R:KlqdAcY8gKyKGrY5WdXo5BCQ/vG
Behavioral task
behavioral1
Sample
2976-8-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2976-8-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
2976-8-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
172cb2d3fe7401ef8b3f83ef0f70cd9d
-
SHA1
1e37648c0bad43db97b8b146c83c4ef3c5936def
-
SHA256
20a9c3091cb0d7c7bf8133f4f483f8010febeed5a6b8af00d1c10aa4142895e3
-
SHA512
077ac92d7901d5855d55cf01d747ac952e94284a67fc1abdd630f14b9319948124553cfc296f3b453f2f27cb1692d2444675e5a648033727596c358335bfadbe
-
SSDEEP
3072:jVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/R:KlqdAcY8gKyKGrY5WdXo5BCQ/vG
Score1/10 -