General

  • Target

    2384-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    080bcce06d7faade7440dea7f0c244c0

  • SHA1

    75eac6c345848ad0ca7e47f5df47ae403a19d083

  • SHA256

    6eb19373bff53b83710a648862d075a37f3a0ec2fdace9ee636d3423bc4f14eb

  • SHA512

    4984d4e7ac35170f5804edf27fb33366a7d42168bcd66552ad51dc1d8225fb40c946f9f7b3b9f28fa48e3fa83e0fbc9d9089dca5e4c4cb3b7978be67040fac49

  • SSDEEP

    3072:F38wEgsO/iYDypSqcqKyhx5PLuc05tjcnbcDRR:18wEgsO/iYDyg4z5P6cZne

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.horeca-bucuresti.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    e)rWKbKP8~mO

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2384-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections