General

  • Target

    2952-39-0x000000006F0A0000-0x0000000070102000-memory.dmp

  • Size

    16.4MB

  • MD5

    b68ecfc792c0b0a0f75e0e037042a7cd

  • SHA1

    beaf6956f88c0645cde96c71208ed1c87a376a3d

  • SHA256

    cd2810009470f0e30a0883577662346457d7224deb2925e1d2666a61b97ce3d1

  • SHA512

    c718cdc08dacd46d091410bb820ea42c28390a32b4743faa05556fd6827e3ac58d4b175f6c485ed2409e85a5fc70cea12ebca5b15ba0f3a6509ed939fcd4215c

  • SSDEEP

    3072:nFJvf8yymr74X1LcWFJXnUiWMQXQF2eXwbDcvHnp0:T8Fmr74X1LrJXnUiWTXHmnR

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.customcedarfencesmichigan.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    V#!rawb#6aS%

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2952-39-0x000000006F0A0000-0x0000000070102000-memory.dmp
    .exe windows x86


    Headers

    Sections