General

  • Target

    2820-11-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • Sample

    250422-1wjzqasnx5

  • MD5

    f580033bac18d09c9b89851b8a6c08fb

  • SHA1

    a6f97af5f32f888c08105b91ae2081022dd45640

  • SHA256

    7161460f15ece043f47e149f2540e467d3dc5ebc08297fa040c456b63efa9e00

  • SHA512

    eb78dbfcb53d4ce7de4a6ce6e97d37c1bf24feb05ecca8e53dd1b9802b636b3b4a26fb796cf97dc96ec0724dd9991a61fcc5e8c536ad27b3a966d7dc0b50936c

  • SSDEEP

    3072:pGWHJanqIldjoJZAnUCfxvicV1Y4WWQeBYWE9cT2XikgBcwkB0iOTJtDymw:pcjIiUBa1CkS9yk5wEyvDy

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.hyshippingcn.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    e*u@qkS4

Targets

    • Target

      2820-11-0x0000000000400000-0x000000000043C000-memory.dmp

    • Size

      240KB

    • MD5

      f580033bac18d09c9b89851b8a6c08fb

    • SHA1

      a6f97af5f32f888c08105b91ae2081022dd45640

    • SHA256

      7161460f15ece043f47e149f2540e467d3dc5ebc08297fa040c456b63efa9e00

    • SHA512

      eb78dbfcb53d4ce7de4a6ce6e97d37c1bf24feb05ecca8e53dd1b9802b636b3b4a26fb796cf97dc96ec0724dd9991a61fcc5e8c536ad27b3a966d7dc0b50936c

    • SSDEEP

      3072:pGWHJanqIldjoJZAnUCfxvicV1Y4WWQeBYWE9cT2XikgBcwkB0iOTJtDymw:pcjIiUBa1CkS9yk5wEyvDy

    Score
    3/10

MITRE ATT&CK Matrix

Tasks