General
-
Target
2752-4-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
Sample
240922-gc194sthkj
-
MD5
f08fd99e86ad232251aef764a1f0883a
-
SHA1
3746cf3dce406e5d0ee636c6c16bd7c5ef3830aa
-
SHA256
15088050faae3ebaab374a7eb48a1d60ec583b13baac081439d9cc02328dd70a
-
SHA512
d82c16cda4164960c714d726bd0b05f535829084a17e040636c1debd3cf17a00ad685955b22e5b805c10c5b52d19cbdf5a53b789b9c809ef4d62b1746681b706
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/m:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Behavioral task
behavioral1
Sample
2752-4-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2752-4-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
2752-4-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
MD5
f08fd99e86ad232251aef764a1f0883a
-
SHA1
3746cf3dce406e5d0ee636c6c16bd7c5ef3830aa
-
SHA256
15088050faae3ebaab374a7eb48a1d60ec583b13baac081439d9cc02328dd70a
-
SHA512
d82c16cda4164960c714d726bd0b05f535829084a17e040636c1debd3cf17a00ad685955b22e5b805c10c5b52d19cbdf5a53b789b9c809ef4d62b1746681b706
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/m:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Score1/10 -