General
-
Target
2980-18-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
250106-yat7fsvray
-
MD5
5345ce6ec03f1e7148c96d6ff839f0b2
-
SHA1
48dd875874bf72e831d8c14c808a4d0ef7c613c1
-
SHA256
66bbbfa61765568ad2ec15a80e68a7b8b0575c9e97d27fb93732c83125895089
-
SHA512
7754591ce0e5ae41c4b920324e7afb537261125cb2654d4b9618b0569224b8392d6169e67571f520209377e90c0d5c4cc2c0c4e68cce473ce9324594739acc43
-
SSDEEP
3072:WaHGsiszDDtdz4SyVefNTufMl0EPLHdVILEiAfcGQV5V7vcP3Hq:fH+szDDtdz4S5FjPf9cGQNvY3
Behavioral task
behavioral1
Sample
2980-18-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2980-18-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://s4.serv00.com - Port:
21 - Username:
f2241_evico - Password:
Doll650#@
Targets
-
-
Target
2980-18-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
5345ce6ec03f1e7148c96d6ff839f0b2
-
SHA1
48dd875874bf72e831d8c14c808a4d0ef7c613c1
-
SHA256
66bbbfa61765568ad2ec15a80e68a7b8b0575c9e97d27fb93732c83125895089
-
SHA512
7754591ce0e5ae41c4b920324e7afb537261125cb2654d4b9618b0569224b8392d6169e67571f520209377e90c0d5c4cc2c0c4e68cce473ce9324594739acc43
-
SSDEEP
3072:WaHGsiszDDtdz4SyVefNTufMl0EPLHdVILEiAfcGQV5V7vcP3Hq:fH+szDDtdz4S5FjPf9cGQNvY3
Score1/10 -