General

  • Target

    2904-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    f80a47941add013493172f13635940b1

  • SHA1

    19ad584804c47338aa4de702c3be6874d5a14209

  • SHA256

    01a2690a51ed0c41c9c169e76bf366f96b976f7a85fdfa5f57d9a36d8ce0e63f

  • SHA512

    67dd4afb0814793fd95a151d8294ac96b723ebfd57b78b4b61a907443c858b3afdebcc7aa1f1348d3a6012f45557a6aabf1997a26d9cf3a638cf1b0d2dcb5774

  • SSDEEP

    1536:6/cPSvuOAPyNJ2t1Loz6LpoAksQ+8uNLkOGXrYRq+6RAoFg5RhRvAOwno+rjtDBz:4cq0AC1LLa0QNu7EtsRvfxEN4Ni

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.corpsa.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -E~O8rekW5UT

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections