General

  • Target

    1420-1152-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7531ad3da726148fe043929b8c0bbd62

  • SHA1

    d0a98d51c262d19bd3c55e2a499e5652fccb0d0b

  • SHA256

    c2ccfeb0e8d149adb336468375fdb3a1ca0e75c9758c8b4f8013eaeaf563ae3b

  • SHA512

    cad245f67a5c5b7a5afb1131490698e2cfbd2750ebb7f7c2c4f82cc48095ece2ef05dfe95707acc226bbe7d6accd21388714103df2e9500c6dd2a7667e124147

  • SSDEEP

    3072:G3aCmYcTJR1xhYzkkWWflGB+vh3DSp0fdahRSzOlF728h:UcNrXc1W7B4kWCgzEx

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.svetigeorgije.co.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4c5H&b2whkD9

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1420-1152-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections