General

  • Target

    2712-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    d904f53cd71370b9d962f7a822d0fc4e

  • SHA1

    396cf573d1a9a98af880fc01eab8983c92c88579

  • SHA256

    642f020c2a6795025d32845bec4611c77af4779c2563afeb53ba5e9438fc633a

  • SHA512

    67e5b0a9dd63e16baedebedbf3694e9b5c65a06dcf55a9cd6bce8f62e7715ae0a2cf449a67b5ce1076d3146a5a6b061f69e45b5532de8f5cb368dff00efe886c

  • SSDEEP

    3072:NkjVFBVRZa1LEhzKKz/iVCikteEsys1+TJjR:cJVTa1Lyp/iVCiDys1+P

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.cvgunawanplastik.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    OcIFe7FAiAO3

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2712-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections