General

  • Target

    400000.CasPol.exe

  • Size

    164KB

  • MD5

    fd119e3f3bbf064a601155a2f3f9e49f

  • SHA1

    371058e943b7d70ce92b2e16baa1731bbc308089

  • SHA256

    cc1f61cf833f0f70dfc3606fcbac0295702d8d0582efcbedb8eede08fc1eae2a

  • SHA512

    6a4dff740d5893d1e49246f0879892959c0dd068ce495b478af752cbef159bf8c93e79f1df1552024b6e5c7f5a49405be5041a78496d6a03d9582eba44736c4a

  • SSDEEP

    3072:nfo+aqTpEb+cxt1nOfQX4NV4f5k6/yhPrlkwESCNim0/H:nNpliPOooNVL6KhTQhQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.mcmprint.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    l9Hh{#_(0shZ

Signatures

Files

  • 400000.CasPol.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections