General

  • Target

    2232-10-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    31cde97050227635e8f160bd3a31d72b

  • SHA1

    41bac9ad94dfdc8399ac67c8cc0687f6d7421680

  • SHA256

    1691d342432ed86da105bce2e38d0787afe50ab5426751a8d42e14c05d740bb5

  • SHA512

    4f5d1fd1799cb2ab8a66e0dcb70d0c223f27ca532458e3a29383139abaee8fa1bec516cf202fb9ecad81534234d8edae585ba563c461ec2c1cce1f7fa82d33d3

  • SSDEEP

    3072:YqIpr/IhHtaRGqAbnOnEQJJ1iaSehMVSbyBUVte4vfwCNOaeP1XB:YqIpr/IhHtQ/onjsA920r2e4XcaeP

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://peruglobo.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    YSw&oCV&c23w

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2232-10-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections