General

  • Target

    1720-9-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    c09b2aeaa699c8935c031b616673718a

  • SHA1

    93b64d32dec4d7647f9e7269e258bdfc36a4053a

  • SHA256

    30d698e912addd2ef66b95ba128c36312e974efcbc43d32591d02baee5f4300a

  • SHA512

    d88c6ca10df0a7203f793e6f4d94a160c34d0dce075df53a216b77bfd34d9b0ba9b69249da67b57be3f8d1c9a553aeae0e58472221652b3d85b75ad5dc7d861a

  • SSDEEP

    3072:WNdbbDRZwjKElYK6WVNcbVBjzp++2Efh53INrHVk:ObbDRZwT7QBjV++18Nj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://80.92.205.47
  • Port:
    21
  • Username:
    delizzasuppl
  • Password:
    99EK7bvTZr4zBnwW

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1720-9-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections