General

  • Target

    3048-16-0x00000000004B0000-0x0000000001512000-memory.dmp

  • Size

    16.4MB

  • MD5

    52ed182039bddbf739e33dec4ef017e1

  • SHA1

    3d92ec7a39c090d1eb006353d66bd8ca5770cccd

  • SHA256

    32b2d0685e8d669c767fbb94615dc83c81beb08a2740bb8da12c475c2e8c4649

  • SHA512

    9dbe3224eb76b1957366277befa71176cd3b3b5b1ea05f2753e6771b3a428e679fecd04d29809c0d879b88ea1f1b226a1891b2b4ce2496c44026a04026baca7a

  • SSDEEP

    3072:WJ//vfPYrXhYkYsHkaFF8cfaXumYP+3ngeaX59DZQkVJvip:w//vfPWRYkYAbFF8Iafj3wPGkVhi

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fredy.ee
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3048-16-0x00000000004B0000-0x0000000001512000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections