General

  • Target

    628-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    8d6bb41dcfcd9d3ce7f0d5f41e3498af

  • SHA1

    fd35fae1fe87120c1ca27e42f7ed87ad131fad8c

  • SHA256

    3defaff9a36920a3c54117f10f8ddb6d784a2511031f5c0bef265d3014ec16d7

  • SHA512

    33c1ef65f4241d5a53610f863e3a0dd4f7b9439e565aea451829769b004320c322dfbb826370767afac377cf72642967682f3f2cd98f6e9a678598dac53f9896

  • SSDEEP

    3072:x4KMgO3TH7UrMjffBHMr3Tr+nea+Q5I0fHyq5jaUC9z:XMgO3TH7UrMjXkgefQ5I0fSPUi

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    $%M4,p)]vd1=

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 628-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections