General

  • Target

    352-37-0x0000000000FD0000-0x0000000002032000-memory.dmp

  • Size

    16.4MB

  • MD5

    697897a2120e021f60477109936d81ca

  • SHA1

    623bf085578a643545c0019e5d18eefc8e57f4a5

  • SHA256

    c8d40a3e4d3b385ecd40b7c332a51ba437898a42a5ca52eafe350a4c3574d957

  • SHA512

    c835dc536f65057483159e70bc841350e798845340eedce798ca9b83de04fbc19fbf92c2f62f59c24807f25192fc84441e183e90b596f6798df3e7d424d162fa

  • SSDEEP

    3072:wALbUgsw0bnkHRL+sKPFwLjAOj995MSq2t0i:DLbUgsw0oxLNWF9Oj9zqX

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.petrolic-eg.com
  • Port:
    21
  • Username:
    outcome
  • Password:
    Random@1245

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 352-37-0x0000000000FD0000-0x0000000002032000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections