General

  • Target

    524-9-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    8ede8730bb5dbfb920e49491f0c51f70

  • SHA1

    f23d8aeb5a48927abed9b8edb32c2d4d067c3862

  • SHA256

    f4e5058ffa9975ad0f03ecb26e7fc9e969a4f9d52b721ef1a0d9fcad9b7b5f7e

  • SHA512

    ccf177be1b3bfc230bdf5fb0e93c284075a51db133933c5b1b89627ae76b923e8f47f515ba06fe62a60f62fa33943d3497e4a4702f0d649888870c5a7fa5c9f0

  • SSDEEP

    3072:ic1LFyH1RVpOZWcd2v3Gpscsh+QmwSiZ2YmxkMN5pqBgH:h1LFyH1RVpOYcd2v3v+QHZ2/xkZB+

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.akguneselektrik.com
  • Port:
    21
  • Username:
    akgunes
  • Password:
    9H5xQVGg

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 524-9-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections