General

  • Target

    3064-16-0x0000000072DA0000-0x0000000073E02000-memory.dmp

  • Size

    16.4MB

  • MD5

    1f397c3919beb0219ab9bc9dbac1dbb4

  • SHA1

    ebd3e5d4d479339bdb71a3b13d325446bf16bc6c

  • SHA256

    8d5e1280ad5b9164a98487b232409e014e5913b469712a78b4518dd57d7f793f

  • SHA512

    cedd5a771e4df58ed1c64e3f7b5a06cf358841b5a66f34d376c0765752cef102f565a9f7b60eec97d4766553d9c328ae75ced71b6bbb952f1a0e166cbc7277fb

  • SSDEEP

    3072:6faMOFK5IjI62Bm8C3ZAUczKD4E9aW9P3:6BO85IjoBm8C3Zu6

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vpeszi.hu
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3064-16-0x0000000072DA0000-0x0000000073E02000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections