General

  • Target

    2124-177-0x000000006F4B0000-0x0000000070512000-memory.dmp

  • Size

    923KB

  • MD5

    dbf61ac5e24711077ba47f097aed127a

  • SHA1

    bb51310155fef9d47e1ec47617b5bebd3534f8f1

  • SHA256

    8a3bc8a42bf7ff064bec0173837b28de30e3aa50ede2b9ab84acbabadff48531

  • SHA512

    abf7519ee728761f1d5e473d161122af00304cbdf9b1f70835e2760d7af5a2c17020ca6c12c359ca9f8d856668185dc93b1f5a50f4c3605f8cef58e450743c8f

  • SSDEEP

    3072:lQ8AUgsO3uACf3veXs1TDB7KzJBE5k8V9xkf:K8AUgsO3uDf3veXKxKzJBT49C

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vvspijkenisse.nl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2124-177-0x000000006F4B0000-0x0000000070512000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections