General

  • Target

    2020-64-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    9e1e6e852abaad1750f48893f65c051a

  • SHA1

    b3dfe71bc74ab033129c0bbd4800aceecd4597d5

  • SHA256

    03d7db46def5c8088f290299538c1e1589ee85651eccb69a1d20485b4fa46430

  • SHA512

    299185d7fdba6d72db127579402cea4bef8031b8f11cbfea811f28b542af57bee52624f195d777a741e0fde1fd563c86e728ea34a3416b8a1370885a911e3d92

  • SSDEEP

    3072:XmQBCskvJWF7S/ZqC8Uv+oZ5hRYXx6H3FwuVenh8FUaifyaXKI76mp63UDEu:XVGyU5jRYm1wu0h8FUHfyO5bMUD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.good-shepherd-ministries.org/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    boygirl123456

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 2020-64-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections