General

  • Target

    641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0

  • Size

    163KB

  • Sample

    241222-bkfeqaxkdz

  • MD5

    552f3cde282bad13ae7e098caefb9356

  • SHA1

    abe4748084dc97240e010e2152139e2f4431dffd

  • SHA256

    641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0

  • SHA512

    65857bb7b81c97765a4e1c7cd100257ac25b09d1d16e410f2607ab821e49f677a2ced194e3e797cd166ea6591db23e2b4182572505504ba08902deeffa95bcbe

  • SSDEEP

    3072:xTa9vnJ+KlOR1RIh8sA9gfxFbFTMgPIFCaUpZh2g9C+QPrOvHI4b:LKUrGfcmbF4CpLH953

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.crownoffice.xyz
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    GRACEoverflow123@12

Targets

    • Target

      641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0

    • Size

      163KB

    • MD5

      552f3cde282bad13ae7e098caefb9356

    • SHA1

      abe4748084dc97240e010e2152139e2f4431dffd

    • SHA256

      641575683576a745930eafab72bbe93c2c9787a2629edfd320a8e4d63d9192c0

    • SHA512

      65857bb7b81c97765a4e1c7cd100257ac25b09d1d16e410f2607ab821e49f677a2ced194e3e797cd166ea6591db23e2b4182572505504ba08902deeffa95bcbe

    • SSDEEP

      3072:xTa9vnJ+KlOR1RIh8sA9gfxFbFTMgPIFCaUpZh2g9C+QPrOvHI4b:LKUrGfcmbF4CpLH953

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks