General
-
Target
972-31-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240924-h2nwravgkk
-
MD5
4764d79685611ecb366b4ea97b7e2c69
-
SHA1
04553db8fe35edddeb485bd871b1df285f23441d
-
SHA256
843c1adc8960d3d8454caad881758a177b7329d3e7105b60e6b3c36f79a8990d
-
SHA512
769a64ae2563fcb04c518f37b1204d808471a691efeb5011504f4a1969fdce82d6bea0b375b972e03e38c0766aef97e6c30183d47638864c2b35e0e499dee6c6
-
SSDEEP
3072:uO1lKWSm6R/4SUms917aqtJL8S435e59/ZW4yL:3lKWSm6R/4SUr95xt58S4i9/E
Behavioral task
behavioral1
Sample
972-31-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
972-31-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.libreriagandhi.cl - Port:
21 - Username:
[email protected] - Password:
x6p2^m#1#~+O
Targets
-
-
Target
972-31-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
4764d79685611ecb366b4ea97b7e2c69
-
SHA1
04553db8fe35edddeb485bd871b1df285f23441d
-
SHA256
843c1adc8960d3d8454caad881758a177b7329d3e7105b60e6b3c36f79a8990d
-
SHA512
769a64ae2563fcb04c518f37b1204d808471a691efeb5011504f4a1969fdce82d6bea0b375b972e03e38c0766aef97e6c30183d47638864c2b35e0e499dee6c6
-
SSDEEP
3072:uO1lKWSm6R/4SUms917aqtJL8S435e59/ZW4yL:3lKWSm6R/4SUr95xt58S4i9/E
Score1/10 -