General

  • Target

    3052-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    945526cc9279e7dae8028bca5bb6baad

  • SHA1

    d65a6625779a4bafeaf1ab081b08484f681db9be

  • SHA256

    0c210b98bc6fbca0452a8fd440c08a7944b5669a80a6cb6d10f6246a1a93d600

  • SHA512

    20c26b618bfc741c3d598c29f8d324d178f3de006f59e9dac4ffebcda1f6230b33b6085ab3b21ac39b91b5d99bd8cd867aef8666b722fb1b01f486c7a4877de0

  • SSDEEP

    3072:aNP81J6tpdRtlPXzRrmWenUPdzyq8rSC5mLz5KlnS:MLtpdRtlPFmWenKFBWSp5Wn

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.mercuresurabaya.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    2ffPmXZ_5A{G

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections