General

  • Target

    2560-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    ee164b398fb66ab1174bb347aac78392

  • SHA1

    ee6c1f1e0e38b6bf67b0afdf85520a1b23203fcd

  • SHA256

    1574eb383fd338d9e6e774a0bca14a6c28520c6abdcfd255f6cf2aa650fcfa9a

  • SHA512

    528c59350c650512266d0959b7dd538f03577f51d681af37574c04539362be525fce846e9d1ad8eb4738bc615e5aff8d2a49aa68f19ee6a58e96923e148cbf32

  • SSDEEP

    3072:+BpymSey2SwA7AdcMSfV988hRpeX5a1j1K:EpymSey29AUe3f/8Ki4jU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    9ac0cf87ed1947d4b15aec897abbbdba
  • Password:
    cKBIF8RRwUC71Led4rcPdH6XwRMOgM3U

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections