General

  • Target

    2644-17-0x00000000049F0000-0x0000000004A30000-memory.dmp

  • Size

    256KB

  • MD5

    6346934a71730aa9595f7b602404ad3e

  • SHA1

    cf935e9c2650606f9344966c2170cd3621c51fd4

  • SHA256

    1d0279c8ac050866a5f1d6b4faf3c1868565a04219fe0812bc15415293b7b2f3

  • SHA512

    ba883d33257148bf541fd98a26135fc364e1447c939c28be727136025a22375e3f5c5e309d387d741f7fa6988ba4a573baeea9c3e14aee9e13c2665571737887

  • SSDEEP

    3072:rZER1htB3soqMg/Ce7GwkjGDLiFrc5XoV/obj:2R1htB3soqMg/R78GfyPV/u

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://mydevelopmentstory.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ENugu@042EN

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2644-17-0x00000000049F0000-0x0000000004A30000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections