General

  • Target

    2268-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    0a25ca132450508ca20b0a57a5932380

  • SHA1

    167ad267eeb00ce84ef5b035bee603e0c7388d32

  • SHA256

    cc80c30b2928c1c6baa4f1699b868237062820380e8238de9b248916a119d3f5

  • SHA512

    4d910978eabc5e364fd91cd0971cb5172b9e372b34029462c28ef545f4c5e9cfd5801f2e2e0c95230486ffec7e49fbae6b8c0422a98cba92871e3b6887ae9ce5

  • SSDEEP

    3072:zGXpSeS1Lt6nrfk7pfhSYkjxrrosN+JFz:AIeS1Lirfk7zSYkFrrosEv

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://thedress.pk
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    texas1234567890

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2268-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections