General

  • Target

    2004-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    15019fc51971296156b27697aa7975c8

  • SHA1

    4061a8ef7256356739d455abd793a29ad16caaa6

  • SHA256

    7deee156d052f992e588ae75e4477080a97f7fbac0a9172fd384a7a95d209b27

  • SHA512

    5418c72ba1b527236dcdc00fbb17d9e4755adf2f1ad99e9621ac6d7a093619e030c2dd35280930f2ec873e365a51c81c4ec4e342942597f1d56af0a309131f4a

  • SSDEEP

    3072:z18qOS+KeLPf/hyylNwhp+xysEDH5fzfNzLWR:JrOS+KeLPf/pTEsEDpfB

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.amtechprinting.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (HQ)-Hii[i7R

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections