General
-
Target
3120-72-0x00000000010F0000-0x0000000001132000-memory.dmp
-
Size
264KB
-
Sample
241118-k26gxatama
-
MD5
51c3508d119fbecbf2fab351a3048922
-
SHA1
b0d283798caec58013763735f1081554d32364e4
-
SHA256
89d9e15004600d682e7544a1b4417ec45bb3efa80c6539a4841268763bae4d2c
-
SHA512
5dde072c2cdb26a41e5881ea25b5863a7a94155c97ed20f4df71daf428611869b81f5037157f99108c2ff65f9d27e900d0bf6877d86f1f19158f817ed2708105
-
SSDEEP
3072:pfHfvPfvjuIDpi8c0868ZnGMUxm1HsS3P5jVOzhBM0dcU:xfvPfvSIDpi8c08TGisS3nOzM
Behavioral task
behavioral1
Sample
3120-72-0x00000000010F0000-0x0000000001132000-memory.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3120-72-0x00000000010F0000-0x0000000001132000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.carbognin.it - Port:
21 - Username:
[email protected] - Password:
59Cif8wZUH#X
Targets
-
-
Target
3120-72-0x00000000010F0000-0x0000000001132000-memory.dmp
-
Size
264KB
-
MD5
51c3508d119fbecbf2fab351a3048922
-
SHA1
b0d283798caec58013763735f1081554d32364e4
-
SHA256
89d9e15004600d682e7544a1b4417ec45bb3efa80c6539a4841268763bae4d2c
-
SHA512
5dde072c2cdb26a41e5881ea25b5863a7a94155c97ed20f4df71daf428611869b81f5037157f99108c2ff65f9d27e900d0bf6877d86f1f19158f817ed2708105
-
SSDEEP
3072:pfHfvPfvjuIDpi8c0868ZnGMUxm1HsS3P5jVOzhBM0dcU:xfvPfvSIDpi8c08TGisS3nOzM
Score1/10 -