General

  • Target

    2560-12-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    116258c5e583adf2714f66cd5afcc40d

  • SHA1

    1497dbbb7ecedf8923e54bdaa69f16c6f483cbb8

  • SHA256

    a3fbc74092a8b8e9e7b335ef884fb1739aba9d333bf47511b9fb0d0f08cb9f5a

  • SHA512

    fe9a735ff3111404537e39ad69a677d5ed74d6a3d90935f3a437d2174ae0101244f9744df1bf97d21daaa0773f3b1b09026418cbb25fe5a8be5be64f9629674d

  • SSDEEP

    3072:J38fjw8AUgjaluR7SzWGOPrVQ8n/5M/vnZK:p8fjw8AUgjalRWGUVQYyvnw

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aksumer.com
  • Port:
    21
  • Username:
    aksumerc
  • Password:
    211116.kS*-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-12-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections