General

  • Target

    decode_f09764ccc06add3942a230a1a4ad0ca760da69771e180b7c0b864e4420fe4d63.exe

  • Size

    245KB

  • MD5

    a9b19408c0b32b59cb6c9181ce45bb78

  • SHA1

    c66d7e923119c989dd514fafb1eaae9f47dc71d3

  • SHA256

    298931b43db6dce1afaff7f8f587eb54937299ffd1b332957a9f30ebaa217577

  • SHA512

    f7f24f738663f694a600d1926f83017667e38064fab7880be5a9889e6bd73e997a926da693bc342152d5462c115599983f89d4bff0d1c36d24841ac56fbc88a1

  • SSDEEP

    3072:qGn0nAc4b1EYwkRvLzS61cRkplOC/kSLszZtVoXK:qGnuAc4REYwavLzL1cRslOa/MqX

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://myogessentials.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ENugu@042

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • decode_f09764ccc06add3942a230a1a4ad0ca760da69771e180b7c0b864e4420fe4d63.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections