General

  • Target

    2756-36-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    4c5195774647945bc93d59f2266bea9b

  • SHA1

    d760fbf010fabecf23d609d05541f8903cd6536b

  • SHA256

    4ae43ff912246eebae3237e55823eb4764d8426e27d981d81634c30d53cfa2f0

  • SHA512

    596de6347c83f3d5e47f74cace99fd3203f3192f082d7c925bf0a41788ab0a1ae93ea215424497081de6c15ac4a8983e34796a1ac503ebb162a716d193d21b51

  • SSDEEP

    3072:zGXpSeS1Lt6nrfk7pfhSYkjxrrosN+JFz:AIeS1Lirfk7zSYkFrrosEv

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://thedress.pk
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    texas1234567890

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2756-36-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections