General

  • Target

    2128-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    99f304d7cd4535295dff28607f391dfe

  • SHA1

    7188cb200a9fac0fde1f2435b41606912b3446ea

  • SHA256

    cb15e1516f2fdb621cc0c92661ff4893d8883f98cc699172f28ef41a173a3c82

  • SHA512

    14346c76a7dae9a31ff83784220b88c2aeee1a5d8346391e0a9e9af947a7929ea9dc2b6f83a6dc383aebe509f7fb791c619ca6e2b4bce355602f2c11d132958b

  • SSDEEP

    3072:z18qOS+KeLPf/hyylNwhp+xysEDH5fzfNzLWN:JrOS+KeLPf/pTEsEDpfB

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.amtechprinting.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (HQ)-Hii[i7R

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2128-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections