General

  • Target

    2748-10-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    c5cc0f17e993d9265986710f6cf048ec

  • SHA1

    267a575951e7aa3dab4cd48c42ba1a37aa93437a

  • SHA256

    57ba816ecfda8a8ef49ce42bae715b22f4abde2cb4e5637e2579822c0657a171

  • SHA512

    96aa031b1bb773ed5c91c99842f069a995ccf00433bdf3b97d6bfd0efc06698c6219a397701794218ac7d04def5ca69a1c67c91932438e2c6b28490980d4a865

  • SSDEEP

    3072:vnsNXpgUAMhzcxY+oN7E9bcWjBG5ed+mVG3:PsNXpgUAMhzcx6NI9bnFX+mA

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Kingdom12345@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2748-10-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections