General

  • Target

    1924-156-0x000000006FB90000-0x0000000070BF2000-memory.dmp

  • Size

    16.4MB

  • MD5

    d25b00380585f3e5dab16a9353f94a69

  • SHA1

    ac5ae5da343a0ed1e557f62fe82e5c45eb1185c2

  • SHA256

    515a025541c528385b72d444b432f4b4e67514abffcf66a65cdecfd4a89969df

  • SHA512

    f842f5e8b2225fcc6aeaabaae33ccb20e6a88d02b95b9b79c51728d7b82fda96f035121d0959d1e35ff68219a31d5effa9f81e03e6175edd8fe2a1ab24e88dbf

  • SSDEEP

    3072:+Q8AUgsO3uACf3veXs1TDB7KzJBE5k8V9xk9:d8AUgsO3uDf3veXKxKzJBT49C

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vvspijkenisse.nl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1924-156-0x000000006FB90000-0x0000000070BF2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections