General

  • Target

    2752-4-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • Sample

    240922-gc194sthkj

  • MD5

    f08fd99e86ad232251aef764a1f0883a

  • SHA1

    3746cf3dce406e5d0ee636c6c16bd7c5ef3830aa

  • SHA256

    15088050faae3ebaab374a7eb48a1d60ec583b13baac081439d9cc02328dd70a

  • SHA512

    d82c16cda4164960c714d726bd0b05f535829084a17e040636c1debd3cf17a00ad685955b22e5b805c10c5b52d19cbdf5a53b789b9c809ef4d62b1746681b706

  • SSDEEP

    3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/m:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      2752-4-0x0000000000090000-0x00000000000D2000-memory.dmp

    • Size

      264KB

    • MD5

      f08fd99e86ad232251aef764a1f0883a

    • SHA1

      3746cf3dce406e5d0ee636c6c16bd7c5ef3830aa

    • SHA256

      15088050faae3ebaab374a7eb48a1d60ec583b13baac081439d9cc02328dd70a

    • SHA512

      d82c16cda4164960c714d726bd0b05f535829084a17e040636c1debd3cf17a00ad685955b22e5b805c10c5b52d19cbdf5a53b789b9c809ef4d62b1746681b706

    • SSDEEP

      3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/m:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

    Score
    1/10

MITRE ATT&CK Matrix

Tasks