General

  • Target

    1852-73-0x0000000000370000-0x00000000003B0000-memory.dmp

  • Size

    256KB

  • MD5

    827b93884139a48b11806d991bf3770f

  • SHA1

    0790101e6c79edd5706b75adaf5d6a5b717bb92e

  • SHA256

    68a5ceabe82bd93ae6a363d898437f8594c3f2687207c2cf309a659d6d8f9c74

  • SHA512

    563390f866d7ce147822f71a8c5543efeb016efcfc2c22c9279d2e738246ef48f9cf65fedb9560d9a1de9d1e93424cedfc00ed77fb77c14a870fa64e26a70ebd

  • SSDEEP

    3072:CHbkMN8o+cemkJEqIzYTX5uppj/vJZICJbyQIfcXrkMN8o+cem1HU:MAciEqxCkCJeQIfdc9U

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://royal-arois.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ENugu@042

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1852-73-0x0000000000370000-0x00000000003B0000-memory.dmp
    .exe windows x86


    Headers

    Sections