General

  • Target

    224-796-0x0000000000400000-0x000000000062B000-memory.dmp

  • Size

    2.2MB

  • MD5

    873a4810fe4df46871a38fd084f7b09d

  • SHA1

    69b19ce32f03649985e5b7db90871682cc7fb78e

  • SHA256

    0cadf8778e1a1017fe3fd683c9b7a7bf6b8c182f130a921b381f15a4c4e0c867

  • SHA512

    0dd743bbe6334c3869c8de539d2ca8f1d9710273e02d119186b551471622011f946b621186785d511cc5828032e59fb0184af26c46024e728aa11ae4e954fd11

  • SSDEEP

    3072:6H4wTk5ejtFfAEzV4dLqtvizQkriD7qUtDw6+AYjbBs8MmWkj:6H4wTk5ejtpzVoCvHg6rpYjb/h

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vvspijkenisse.nl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 224-796-0x0000000000400000-0x000000000062B000-memory.dmp
    .exe windows x86


    Headers

    Sections