General

  • Target

    1720-9-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    e6e8ffbe59577e4bd75e6979dbeb3afa

  • SHA1

    c92d1e53afad09eb37cc297dd57c6e6d52291158

  • SHA256

    62754bce834d6eb5f8b29beb03e46626afb3d9f37b781e7c4bc5ae87683dc92f

  • SHA512

    396eb773b17b80a93f934bc33418b02a7962036522d9a0e38278d7806ff09dff6b7983f042dda295439642c4c05d159ca10a45f423c0f1498defab928258546a

  • SSDEEP

    3072:QOw/k7XjnbP29wMYISDyFowVpNU5lA5Iaz:xws7Xjnbu9zYISDLwVpNn5fz

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ab+LNvim5PAo

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1720-9-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections