General

  • Target

    208-141-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3fcca5e024f27500f7078281189e92da

  • SHA1

    d051ce1df2997fbf7051e26a5603644b027946f0

  • SHA256

    24bfeeae5e5854961c078370b605606f1c06eb7449e00ebe1e63ff6670f7d1c5

  • SHA512

    c89bd332157de9203196a14d691489a7ebf9cb2db4546d7536f88a08dde721dd7b16e63171c12cd6c40822478d17a8bf67ec7d5bdfdc9eb3fe9d55654583ffac

  • SSDEEP

    3072:BjCuGo6sD5bOgf280+b8gZXKKtkNXyD5LOAuysC9b:BOpIf2qplaXyDQAwC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.lucd.ru
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    obum@911

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 208-141-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections