General

  • Target

    948-7-0x00000000006D0000-0x0000000000712000-memory.dmp

  • Size

    264KB

  • MD5

    69cfac8a3760be3238114c90e4a1c4b1

  • SHA1

    d620d859ea632166f64cfafb8eaa7df7ce939469

  • SHA256

    ba9522c75ee078d1d32c24f5e510abe97b5ddf5529ef5d4cc69a0be9a3bd88fc

  • SHA512

    2f1123443cb865abc719c7bc298445866877c16393dbeffc2cbdfd038e49d811b4c0f8f2bd3385bbf15c6fd46749b5a3f07e8e05186c93b12bdba4aa107cd857

  • SSDEEP

    3072:LyPLZ+KeCuPAMdF2wdJsbV8Fh5PdhTbH11:eV+KeCuPAaF26JSWFphPH

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.exact-thailand.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    VQGt%i?FHET0

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 948-7-0x00000000006D0000-0x0000000000712000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections