General
-
Target
2868-17-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
241118-sxegmazelq
-
MD5
b2ccf4bfbf5c5953d1ef2b7d93044910
-
SHA1
3803d77b047e65194923eeb605774af9b845122a
-
SHA256
719380fe3e7a668b3edfad55cc2dc4d07a7c015c7a1f3cb3bed16c2776889481
-
SHA512
190ff4f038c56c4a7d41ebace98c8f0b84489998434ba6afeac56f6e1099ea5e67b8ca2400c845ce3af8a9fe67dffbfd028614120dcd110551618e43c605ce02
-
SSDEEP
3072:xmpZgsw0w8vBgsN6FsPveoIFnA7yF5xGTYVn:QpZgsw0w8vBgsN6mPvlMA2ETg
Behavioral task
behavioral1
Sample
2868-17-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2868-17-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://cash4cars.nz - Port:
21 - Username:
[email protected] - Password:
-[([pqM~nGA4
Targets
-
-
Target
2868-17-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
b2ccf4bfbf5c5953d1ef2b7d93044910
-
SHA1
3803d77b047e65194923eeb605774af9b845122a
-
SHA256
719380fe3e7a668b3edfad55cc2dc4d07a7c015c7a1f3cb3bed16c2776889481
-
SHA512
190ff4f038c56c4a7d41ebace98c8f0b84489998434ba6afeac56f6e1099ea5e67b8ca2400c845ce3af8a9fe67dffbfd028614120dcd110551618e43c605ce02
-
SSDEEP
3072:xmpZgsw0w8vBgsN6FsPveoIFnA7yF5xGTYVn:QpZgsw0w8vBgsN6mPvlMA2ETg
Score1/10 -