General

  • Target

    616-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b611ca44da857670a55b81f948a1327d

  • SHA1

    e506387eae60749bc88af4b35fcb8a1daf99a56e

  • SHA256

    793afeb24cec352fde135fab52d6fb3d9a0ed46b9b455b38eb3ba354a69482a1

  • SHA512

    75a1c68885ca1591522aa9fe7af2777d84f89c1afb0e4475c31d824eb91ca04f4728109c10973c98cef9af71f32f8be63ed5087fa7d8b5d97457ef7e0069bc05

  • SSDEEP

    3072:+Tsn+NYyFQzXPojbJ/OTmxgD9ZpV7nBVOjMWXr:+5NYhgYTmwF72AW7

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.atikol.cam
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    mike63976460

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 616-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections