General

  • Target

    2016-100-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    8c1eb82080ae259235dda180aa8b84f0

  • SHA1

    525fb02506a5b08d283bda08e1ce3531919f3afd

  • SHA256

    865401610717e7c0ef0ef9af8c971d187c19402bdc2a73b158eaa0a4f32acf96

  • SHA512

    c14f52da5084aff3a35f2d4de3775dd1ff1304453e882db4e91ccf7b2877a05b6a3c29a017399101a225bf7dc6e7fde049083bbaf5f42322f7241ebb1b858c0b

  • SSDEEP

    3072:UqKpQb1htB1Tpeaqm86z4k8geoG0MsvPb30+n5Lht+r7E:+Qb1htB1lef6YNbsnb3jLtM

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.folder.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    R2r76%(3v^H0

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2016-100-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections