General

  • Target

    3068-11-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    3e51760257c5985dde606ec100f06d25

  • SHA1

    11070d5f31ad176f368d086ca8338e10d1f35f35

  • SHA256

    4cfac4fe77119b60ea5d3d943648b43833baedf2363f5b1386361931bd1efe63

  • SHA512

    8ddcca1ea1627549cf30576314ddc9ffcc9b4af93fad3edfc2e41fba9fadd1baa239257042fff69dd1ff3c834952bc68e4bc76c3cf6a2ecc7b357bd5545d75d4

  • SSDEEP

    3072:2zkVb3zn7z9Tf66O0c0K0ikzto9oBJYg1M5lqN8iW:ykVb3zn7Vf66Oh0xO9oBSwR8R

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://eu-west-1.sftpcloud.io
  • Port:
    21
  • Username:
    6248aba3e30c4d5ca11aad04dd95e385
  • Password:
    DmEnBqH5w7NurkaD91VotzcZtKMTXKbe

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-11-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections