General

  • Target

    2920-4-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    791949a6e56b35d79326201adabc6339

  • SHA1

    389b998b27f82e87f0fad02a82cee11dae7c1242

  • SHA256

    98d0b3ad55ae02620a1a1ea0848e25364a401dc2bf3a3ccd8e48ca59719b561d

  • SHA512

    514c101182efa97d945a41c93714b0c617aea457cda93d5c6d55fbb59f7458510e7f96f17b47e9b8b17f9eb54915f2d72bd8b60399732b6cf809d339945c3940

  • SSDEEP

    3072:vnsNXpgUAMhzcxY+oN7E9bcWjBG5ed+mVG3:PsNXpgUAMhzcx6NI9bnFX+mA

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Kingdom12345@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-4-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections