General
-
Target
868-3-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
Sample
241004-l3rktascje
-
MD5
8cd9c853aead82275cd0494ee7be21e6
-
SHA1
fbc774bb611dfbb3f61cfd4b71f0472d2fc7b5b6
-
SHA256
403179114ad858a7cb60798907d5f5342c9cab61d05da4aa3d7218fb6ac4bc77
-
SHA512
bd1dad89072272484a08454837450be37223858cd4dc2a6bea6207055933cad37870a42563d77d12576b122805e1343ee76f9ed1e55c2549e93ea10c976c7803
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/Y:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Behavioral task
behavioral1
Sample
868-3-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
868-3-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
868-3-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
MD5
8cd9c853aead82275cd0494ee7be21e6
-
SHA1
fbc774bb611dfbb3f61cfd4b71f0472d2fc7b5b6
-
SHA256
403179114ad858a7cb60798907d5f5342c9cab61d05da4aa3d7218fb6ac4bc77
-
SHA512
bd1dad89072272484a08454837450be37223858cd4dc2a6bea6207055933cad37870a42563d77d12576b122805e1343ee76f9ed1e55c2549e93ea10c976c7803
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/Y:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Score1/10 -