General

  • Target

    2776-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    9c6f63835db0b3c7d35314d727ca84ed

  • SHA1

    2998c3e4062ee5561ee06d7876003e70679ca6fa

  • SHA256

    8e7ae6d90a78a5b9dcff6ce40da357886ad613af300ae20f36c81c471fa31b82

  • SHA512

    ff0cd7d27a499ca49403d81e47ee253adf704aaf9d3e71e92b32e86eb4d891f9f5e31ee9f2e13452191a67810902c4083870e019905ffcb0600b00867a68fde5

  • SSDEEP

    3072:DL5XnEpHIjTUPmj5BdOUU8cNPTd4QX99ap:PdyIj2mj5TOUsTd4QXHe

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://mercuresurabaya.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    COM&qS[LeyKQ

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2776-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections