General
-
Target
2792-7-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
Sample
241120-hsdz7axrbn
-
MD5
568d989f3dd9a4d5f15f4c050784b656
-
SHA1
92e6c63765fad5f4b2195bd6e8db91331d232b39
-
SHA256
2f7adc0385af9f84aee18e75d76b667ec25cdc94c46f6ef6163c8a210fb09ebc
-
SHA512
1c3a709948b1d5a1e42564e0d38460e61af39b2a35330bc5e1040c7e061bca7ad14b7e7368873fc8a520005b3949c7d777419aa885cb54ab03b686bcfde33fab
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/x:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Behavioral task
behavioral1
Sample
2792-7-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2792-7-0x0000000000090000-0x00000000000D2000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
-GN,s*KH{VEhPmo)+f
Targets
-
-
Target
2792-7-0x0000000000090000-0x00000000000D2000-memory.dmp
-
Size
264KB
-
MD5
568d989f3dd9a4d5f15f4c050784b656
-
SHA1
92e6c63765fad5f4b2195bd6e8db91331d232b39
-
SHA256
2f7adc0385af9f84aee18e75d76b667ec25cdc94c46f6ef6163c8a210fb09ebc
-
SHA512
1c3a709948b1d5a1e42564e0d38460e61af39b2a35330bc5e1040c7e061bca7ad14b7e7368873fc8a520005b3949c7d777419aa885cb54ab03b686bcfde33fab
-
SSDEEP
3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/x:QlqdAcY8gKyKGrY5WdXo5BCQ/vG
Score1/10 -