General

  • Target

    2316-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    0acc01861a17ebcba202636330fffa92

  • SHA1

    43ada95a8afa3039cca3ed949374ac851a9144dd

  • SHA256

    419eb4e910975af9662e585ab736ab781963a6fd5f1a7fb7ca3ff43cf13ef647

  • SHA512

    82ee3181b6cf7e19eae418e24348881ead1f6cf799c54f2996a8f9a532edfa5d6d67c60bf0569474eb75740d865ed14b8956336b257b9972a15bae230478d059

  • SSDEEP

    3072:lJgFUgsw0CmcXhNDTwMPkUCtYeNb5shjCa5U:bgFUgsw0CmcXhNDUMsUSnyjt5

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Kingdom12345@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2316-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections