General

  • Target

    3008-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    0c612cd622c306f90b9077f172757b71

  • SHA1

    492e94729c3161657f50dc8afc049f4f80854010

  • SHA256

    9c9c90bde1dd2909fbe2137470fb991ccb0a0f68d6d335e1af389d06aa3916c2

  • SHA512

    d0e77071c4b1b77a796f0c87baaccbbe70ed96d20573b268d93635bc7222f61f062bfdc1fc67af0454004ed58268732fbc47876a5f16ea2764ccad11fa8352e7

  • SSDEEP

    3072:oc2FwgI4g90W3KMB/jQLAFjb1baOV3+bdKkl5yk1mUcS7t:2wgI4g9V3KMwkbaE3+bdKkS8m+

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.inhanoi.net.vn
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    usarmy11111@@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3008-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections