General

  • Target

    2672-204-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    90e22b9fff412717b8abb543cd11e2e9

  • SHA1

    7069204fe94cf14005c004be0b12abc131eb6bc2

  • SHA256

    0737856938e29c5bcf20dfcd3f238f40b8b95fb2287295fb4e665d7d20a2e5ca

  • SHA512

    6424e1d90689c7bc3200c3a7941a374edb7a42c57bf1f77eff7203ec230d80300314e7490da1bcb6ae3103e32aa9bc63f917832515f771ff872b79a39c15d96d

  • SSDEEP

    3072:UqKpQb1htB1Tpeaqm86z4k8geoG0MsvPb30+n5Lht+r7:+Qb1htB1lef6YNbsnb3jLtM

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.folder.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    R2r76%(3v^H0

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2672-204-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections