General

  • Target

    1632-229-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    848b8c1f47cb187fdbffd94cc550a3d2

  • SHA1

    9c36eeb71fe785a917fc00b9794fb3c2962ac4e5

  • SHA256

    012d29d45398101a6f2f0874bdb13581395e24c4272771d4e2c9605d75e8b827

  • SHA512

    ef913c2108baff42c44e4c8c49c29148a9dee302871b29c0b6fb153bfdbdd376a919f03185db0d05bfc1c4ee138ddee6233dfc2cd74718216a523f9d6fa6733f

  • SSDEEP

    3072:5qKpQb1htB1Tpeaqm86z4k8geoG0MsvPb30+n5Lht+r7E:BQb1htB1lef6YNbsnb3jLtM

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.folder.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    R2r76%(3v^H0

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-229-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections