General

  • Target

    2684-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    2834e924d79c0a8c8a87131cc5bd7c4a

  • SHA1

    0fd028da2e287a39a8046b14610ef0582d228bb9

  • SHA256

    68f5c91926f3ce022feaeaee248898e6856d02e4b350f7662eb5f647e77fb3aa

  • SHA512

    702e508d707d3997d45f28c43fa5af50373ac054d94cccf51041e7b319f1cd77fcebe35177df880a69f3569499b9b2f8af9a0e054b02372a2955f000994042eb

  • SSDEEP

    3072:Ih2d8AUgs9C8IKl070bppavTDtu5KRvZp:W2d8AUgsNll0YVITZnvv

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.atelierzolotas.gr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    alibaba.com

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2684-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections