General

  • Target

    2716-22-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    f714b0c707c6d7ada9586d62f56e2e62

  • SHA1

    6bb6cb3e296f831216ac769de23e8514456a8591

  • SHA256

    c710bd0bb657c144216cb24c4b95488a64547448a0d4317759af31e41895eeed

  • SHA512

    98e37ad5d2cc1bd1701236c97b713db223c9a8d626326b8c67629d66cd38c6674855ac2c53df40d0f8ec07db066feb68b7cd8b4af468271269c6ba07ac78b70f

  • SSDEEP

    6144:dfZxMGksMUaVDit5MFtSmTCFoD6gPWgVc0mh:d0GksMUSDit5MFtSoD6eWg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://5.255.100.203
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    g54%OI}e@#oA

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2716-22-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections