General

  • Target

    2852-16-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    37aa393a8c523ea8038cc47a8dd09382

  • SHA1

    ce9d8efb55253049c0b1bdf91e6b361fb39096c5

  • SHA256

    bbfdc48fe1334cc22e9cf3fd97d5c763cf0833b0c2bfcc5eb7c5da11a4ede49b

  • SHA512

    fd249fa2ccf0ce570bbbc74af48d502dc9f01f05612cf34fb62ca6c686e55d42e3eae504e5f9efde7454e5a6310338862cd12cb7243ce6b887dc4a9ea23368db

  • SSDEEP

    3072:ZwfXr4Ec9HpZBxp0VAx/Nh9ivcL/25SUToR4Gi:Wfr4Ec9HpZBxp0VAx/X9ivcL/9QoS

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2852-16-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections