General

  • Target

    2564-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    29069684fd748251d33238d7c92e3327

  • SHA1

    d026e09bd0bca303f43870d3a388dda5ff8c6552

  • SHA256

    c9caff99e5ae324c6dc6d53d074eed563bf96f3a25387f9c795a6b385025e999

  • SHA512

    9c74edc845c29987bd4f00e63a78387754136a7154fc2849d2be18450d140b3a9aecd093e5b8808993b7435fc7832f7b0cc7a5c165e89aa19d12510da65e442e

  • SSDEEP

    3072:GSmnt59h99sp1My81V9jLi1Myg3nhmH75pVeaH0Im:/mnt59h99sp1My8hi1B6ngH5eB

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2564-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections