General
-
Target
3016-3-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
Sample
241009-p65hmazald
-
MD5
33346632fc9d38d31056588383bf1c73
-
SHA1
7fc1bb4b24102ff463e98cf57ce6f39515e9706e
-
SHA256
1e0773508cd7d14df7435466009f1454ce70b6c2d99d3f1f973d07bfcf5b1cda
-
SHA512
61df87d4d636d8b027b48c9c2354a5436a7d247a9d2ac17531729f63f9d9745820ff19e1de7565d5f0bcc115f97b48f2f03de137335c98249c98cf8f9c322f89
-
SSDEEP
3072:V16dXiXCyPbXKi14T2xYcEcGi71KZ55KZGCr2r:n6EXLPbXKi1462nJi71KZgGO
Behavioral task
behavioral1
Sample
3016-3-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3016-3-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Targets
-
-
Target
3016-3-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
33346632fc9d38d31056588383bf1c73
-
SHA1
7fc1bb4b24102ff463e98cf57ce6f39515e9706e
-
SHA256
1e0773508cd7d14df7435466009f1454ce70b6c2d99d3f1f973d07bfcf5b1cda
-
SHA512
61df87d4d636d8b027b48c9c2354a5436a7d247a9d2ac17531729f63f9d9745820ff19e1de7565d5f0bcc115f97b48f2f03de137335c98249c98cf8f9c322f89
-
SSDEEP
3072:V16dXiXCyPbXKi14T2xYcEcGi71KZ55KZGCr2r:n6EXLPbXKi1462nJi71KZgGO
Score1/10 -