General

  • Target

    2032-64-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    e1c0b7fad91f1b9a7d5a72f025ceb09c

  • SHA1

    a7e7a6fab8fff97eccb3625e4d6413b72ce41850

  • SHA256

    28a4000077bde25477a74b53b797c23994d976458604369d3d5fca41773f28cf

  • SHA512

    79173a0ed8587528390d842e7da0d4ccfa3f315f34a0314f3091ec7a52604fa0670de14470c3f6edc01e148de1a54320fcbfbb56589aaf9c52a3947404038a94

  • SSDEEP

    3072:XmQBCskvJWF7S/ZqC8Uv+oZ5hRYXx6H3FwuVenh8FUaifyaXKI76mp63UDE:XVGyU5jRYm1wu0h8FUHfyO5bMUD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.good-shepherd-ministries.org/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    boygirl123456

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 2032-64-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections