General

  • Target

    1508-63-0x0000000000400000-0x0000000000466000-memory.dmp

  • Size

    408KB

  • MD5

    4c0e9602903f05ced5da84f57dabf416

  • SHA1

    296a3756c48f4adad6edb19fbd0baddc24df883a

  • SHA256

    e84ce023c6c41703ddd33851351d5ba5bca1bca6c8b2de65a2f2b4343dc41ae7

  • SHA512

    6507119da1b531db77cf1262ffca279b0d9272c41189ceef474c23fbeb47b867ee96942fa6f7cbe75c2dcc79734f5d807b7aebfa283a6991ade30ea5d8aee4e7

  • SSDEEP

    3072:8/7JoTvXIGt6OmmZy7vAIQhyxqvsvQcBZsj0:MJ2p6OmPAjdcDsj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.atikol.cam
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    !L4!S@!C5kOUt88

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1508-63-0x0000000000400000-0x0000000000466000-memory.dmp
    .exe windows x86


    Headers

    Sections