General

  • Target

    1488-128-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    41edabd8694c8cd2978984518da65a10

  • SHA1

    1686a4717b95fc0ff7b62dee4c17505687c1f264

  • SHA256

    7e6de1c9d095a407be63e7e330af24e6fca45f5f5de993565548d0f40ed47845

  • SHA512

    2a754b7f9db12a9296f5729f365dfb981972307e8d619a9c6b6d7f33c7808da79a68e056eda14aace2e622fee433486d934aabbd36da115e46c773acfeccc7a0

  • SSDEEP

    3072:R7ID/bPDvhKMcaH4qGUA6giz+OBx2nlPVk75haiE3ode:eD/bPDvhKMc44qtpBx2lPVkeiC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    =A+N^@~c]~#I

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1488-128-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections