General

  • Target

    2440-43-0x000000006F060000-0x00000000700C2000-memory.dmp

  • Size

    16.4MB

  • MD5

    19db4a5aaec7c892bd3f5dc98a701168

  • SHA1

    bde971695c0596bbceeba7130f212dda2ef6acf2

  • SHA256

    94cfcbe303b5e67c423856c4da749e203010471dc9618af35e3edf0a22539948

  • SHA512

    d9ef66d4ba9710f21aff337563f984f22524e48bae200bb62f7238609867d85245f6dfc79d2098a5c1caaf70670bbc3ccb563e8dceae162ca04f194040172de2

  • SSDEEP

    3072:/VIaM4xAA1LUnHC2FOuIfaK0J1oBP2n0lsZU:9IaMGF1LeHRIuIfaKS1ePO0W

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.pn-nunukan.go.id
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    SX&S)XZ}2zjz

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2440-43-0x000000006F060000-0x00000000700C2000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections