General

  • Target

    2772-10-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    73949e868d8075b60b085fedfc432039

  • SHA1

    abdb89a9d47ab525d1378e518a5b48b7f502a022

  • SHA256

    a4277d3a9c91fa9daa2b6af6974c1aacd2c2e2ecab0a9bb904c1a3ad653e2bee

  • SHA512

    fa8bcae70a8b3c0054e7b0416951128eb1872710b732198fc2ba8050712b0275c78e70faa1d80f58cd15d4267c71494415aa36580a136019c0a0c98765828ce8

  • SSDEEP

    3072:AcxeIjVAUgswPKjB30eGOPkVBDMWLV635lRvvE5:jxeIjVAUgswPKjB30eGO8V5MS6pvs

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Kingdom12345@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2772-10-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections