General

  • Target

    2640-10-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    802d52ac5a0fa7c6af53b03978b077cc

  • SHA1

    18b1c4e1abd7fffc4de25eba10091e20dfe1f99f

  • SHA256

    c823d8f5d8f751d9ad1199e2a2f903c0d8422303b563bb45b741ee200dfe4500

  • SHA512

    2c3a2652ccfb363c4b2e389f91c56cd6f6ebc162487cb62295da14f95821edc54fb99786d2bb2ad2ef9b08ed333a8cae232386995d78231da194659232189e7e

  • SSDEEP

    3072:zW1X0w8AUsM8ciO0dQh5dBw0GbO5WOEEAM:S1X0w8AUsSiO0g5dBw0GbsES

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://beirutrest.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    9yXQ39wz(uL+

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2640-10-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections