General

  • Target

    2144-1136-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    226edf1b1ca9df5ac1ac45cf9c036bd8

  • SHA1

    e3c1c2cdf324da4cc578797340c017f67786bfed

  • SHA256

    1dcf367d56f65cca3c2a785ff0119963b0fa8c8ea9aad866eb48a4a5498ef194

  • SHA512

    70549e4013c5d9ac2167a5d24dd238a9070b5c0e1b2eef0a0f7573f78259891be192f0a9afb81338fd95796c20065ff4ffca65d9475bf41b80ac21c7cc174c55

  • SSDEEP

    3072:SnsNXpgUAMhzcxY+oN7E9bcWjBG5ed+mVG3:ksNXpgUAMhzcx6NI9bnFX+mA

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Kingdom12345@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2144-1136-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections