General
-
Target
2832-17-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
240926-qg9xgsyfkl
-
MD5
99bffdafa30c458371bfa231760d6f9d
-
SHA1
dbb7cc71f1e656163a0350dd81994b6415c7ee15
-
SHA256
911f73afda9e68921febd34e53934d5f7f0e44cad12daf96d34c3a52e781bb89
-
SHA512
e791449849778e406d98f370620f7dd572aafca5db7cf84d45bf14de3264997ec83409cd5552b9908bba25a56b713596ed42f253f3ad6ce52757fc57884b0333
-
SSDEEP
3072:JxN3NB1x9xCxSW2MqnNLZ7UtbvDK59uW58UGQ:tNB1x9xCxSW2MqNLZ7YbvDi35l
Behavioral task
behavioral1
Sample
2832-17-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2832-17-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Targets
-
-
Target
2832-17-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
99bffdafa30c458371bfa231760d6f9d
-
SHA1
dbb7cc71f1e656163a0350dd81994b6415c7ee15
-
SHA256
911f73afda9e68921febd34e53934d5f7f0e44cad12daf96d34c3a52e781bb89
-
SHA512
e791449849778e406d98f370620f7dd572aafca5db7cf84d45bf14de3264997ec83409cd5552b9908bba25a56b713596ed42f253f3ad6ce52757fc57884b0333
-
SSDEEP
3072:JxN3NB1x9xCxSW2MqnNLZ7UtbvDK59uW58UGQ:tNB1x9xCxSW2MqNLZ7YbvDi35l
Score1/10 -