General

  • Target

    2684-10-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    129027a6b5cd09f9371791a85e177ac1

  • SHA1

    5e6221eb934de624f197042953bad9fbc16f9c1d

  • SHA256

    f1838434f1b4401cc988ea31d386e0719e484ba6ecee386869022ef3c9e8cb14

  • SHA512

    edb5c40f1bbf3dd2cb6b677737c12ec2a099a352cf02105eff8877c89f404b99a7e55cd7fc1479c4b38222a69e3ed2d27f511a33569f4814a0b8f245cd21f0b6

  • SSDEEP

    3072:+C1LVJAGi+imE2O13ip/J1l6oGh53vdn1:n1LVmGi+imE2O13G/JObjd1

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2684-10-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections