General

  • Target

    3056-59-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    7746a15a9456418915036be9c8d5329b

  • SHA1

    339c5429657e2886e09921aba14cc2394e7ce7f0

  • SHA256

    ffd7155ac6804415ee2f5ff3fc53a3f07294b82ce55f322d089ac38867f3add2

  • SHA512

    cf655b95ac8d0ae70ca33234b23fc92599b906de6c7a8c625a218f50bd9e02892a50ef117b541c234cccbd50c59fad3a7256fd6a49ec120f43fafe26177056b2

  • SSDEEP

    6144:YXYwQT8AWwpznAdyg/S2JcSRo6RgJ6rYVnRR55OlA3wS3V:DSRo60wo

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    )06$6,YCKM2b

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-59-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows x86


    Headers

    Sections