General

  • Target

    4192-23-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    a16e2dd1f650583daaa24ad724fa2231

  • SHA1

    b25e91a3d9ca6d39f9e4dfa5a090b6757dcf4608

  • SHA256

    473539bf4922455e1283d8122d92bdf2416b54fec6637b27893308e9acf8c5f1

  • SHA512

    187baed6baa79acba78934a6dc4dbe2474eed64d70515a8271d2a5780cd92e8fda11c1879574e721dba0da67e1337ab8d2ea4edbaa6a66534a136a82ad290c4b

  • SSDEEP

    3072:lpTNztjvD3Jpp1hb5fAzkFU2AxXCAz5QupFH4J:HTNztjvD3JppvGgFU2AEAPpZ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.acc-engineering.xyz
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    chinonsonkechi22#

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4192-23-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections