General

  • Target

    4932-50-0x0000000000F80000-0x00000000021D4000-memory.dmp

  • Size

    18.3MB

  • Sample

    240925-rdqvwasfla

  • MD5

    c81d2ae5e5edaaad7c18660a3bc73c70

  • SHA1

    6ac66b54d7eb88f00a422fc4a1a5600287ddfb98

  • SHA256

    11b23a184ad215b37c54d28f29cfea800f06ff0e4deea5c6c9202c6caa3b6efb

  • SHA512

    caccfb4f5d7828ce93637fedb4466ecfac29b78d940dc3d4baea2ab3b7c89466af4b2ff568449bbc4334e9fc65fbf81a75ee4a2bb7a17d8798e90138338c9bd7

  • SSDEEP

    3072:9PnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKn:9Oqu2emeYT6scS/yI4SPEzslK

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Targets

    • Target

      4932-50-0x0000000000F80000-0x00000000021D4000-memory.dmp

    • Size

      18.3MB

    • MD5

      c81d2ae5e5edaaad7c18660a3bc73c70

    • SHA1

      6ac66b54d7eb88f00a422fc4a1a5600287ddfb98

    • SHA256

      11b23a184ad215b37c54d28f29cfea800f06ff0e4deea5c6c9202c6caa3b6efb

    • SHA512

      caccfb4f5d7828ce93637fedb4466ecfac29b78d940dc3d4baea2ab3b7c89466af4b2ff568449bbc4334e9fc65fbf81a75ee4a2bb7a17d8798e90138338c9bd7

    • SSDEEP

      3072:9PnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKn:9Oqu2emeYT6scS/yI4SPEzslK

    Score
    1/10

MITRE ATT&CK Matrix

Tasks