General
-
Target
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0
-
Size
163KB
-
Sample
241222-bkfeqaxkdz
-
MD5
552f3cde282bad13ae7e098caefb9356
-
SHA1
abe4748084dc97240e010e2152139e2f4431dffd
-
SHA256
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0
-
SHA512
65857bb7b81c97765a4e1c7cd100257ac25b09d1d16e410f2607ab821e49f677a2ced194e3e797cd166ea6591db23e2b4182572505504ba08902deeffa95bcbe
-
SSDEEP
3072:xTa9vnJ+KlOR1RIh8sA9gfxFbFTMgPIFCaUpZh2g9C+QPrOvHI4b:LKUrGfcmbF4CpLH953
Behavioral task
behavioral1
Sample
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.crownoffice.xyz - Port:
21 - Username:
[email protected] - Password:
GRACEoverflow123@12
Targets
-
-
Target
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0
-
Size
163KB
-
MD5
552f3cde282bad13ae7e098caefb9356
-
SHA1
abe4748084dc97240e010e2152139e2f4431dffd
-
SHA256
641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0
-
SHA512
65857bb7b81c97765a4e1c7cd100257ac25b09d1d16e410f2607ab821e49f677a2ced194e3e797cd166ea6591db23e2b4182572505504ba08902deeffa95bcbe
-
SSDEEP
3072:xTa9vnJ+KlOR1RIh8sA9gfxFbFTMgPIFCaUpZh2g9C+QPrOvHI4b:LKUrGfcmbF4CpLH953
Score3/10 -