General

  • Target

    1988-68-0x0000000004B30000-0x0000000004B60000-memory.dmp

  • Size

    192KB

  • MD5

    d015488304cea8e76b2dfbd24b3c27ca

  • SHA1

    022f50bce2c5a0f2485613edc0f17634823d29f2

  • SHA256

    a689ec976200a1b93a4597086bec07b3bcc0a8efc74a840645cc6ad5e134cba9

  • SHA512

    428055236f46df984bf6d4752808bb70306da54aebf3c18187ca24adaf3999bafd022b56cb9e3097e19e64b03290a2ba8c1d8a23d62cab4750e6a209cfb4df20

  • SSDEEP

    3072:tkZ3krYX/dqaCNUnc1sT14g3/olURgtknB2ITKUeCwJuW4MN:tkZ3kqONlsTJ2Nw5TK0wi

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.wymascensores.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Fineboy777@!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1988-68-0x0000000004B30000-0x0000000004B60000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections