General

  • Target

    2792-7-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • Sample

    241120-hsdz7axrbn

  • MD5

    568d989f3dd9a4d5f15f4c050784b656

  • SHA1

    92e6c63765fad5f4b2195bd6e8db91331d232b39

  • SHA256

    2f7adc0385af9f84aee18e75d76b667ec25cdc94c46f6ef6163c8a210fb09ebc

  • SHA512

    1c3a709948b1d5a1e42564e0d38460e61af39b2a35330bc5e1040c7e061bca7ad14b7e7368873fc8a520005b3949c7d777419aa885cb54ab03b686bcfde33fab

  • SSDEEP

    3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/x:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      2792-7-0x0000000000090000-0x00000000000D2000-memory.dmp

    • Size

      264KB

    • MD5

      568d989f3dd9a4d5f15f4c050784b656

    • SHA1

      92e6c63765fad5f4b2195bd6e8db91331d232b39

    • SHA256

      2f7adc0385af9f84aee18e75d76b667ec25cdc94c46f6ef6163c8a210fb09ebc

    • SHA512

      1c3a709948b1d5a1e42564e0d38460e61af39b2a35330bc5e1040c7e061bca7ad14b7e7368873fc8a520005b3949c7d777419aa885cb54ab03b686bcfde33fab

    • SSDEEP

      3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/x:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

    Score
    1/10

MITRE ATT&CK Matrix

Tasks