General

  • Target

    2612-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    911bb2d79f8617d65f899021a06a335b

  • SHA1

    d58678d5a47d8623d3e9b32ff0d7ee5d68791881

  • SHA256

    10971801094189df2b4073c0cee63fa7ead34e3c4e9788c081ca943a45df73be

  • SHA512

    683c2525592cfba711bb42950709a097233ca13e8a36ebd3b0379a4e2cc45f689b45ee0067559c490527de933f6d7073e51ac5d4440d148caf83c0d43aa0368f

  • SSDEEP

    3072:HdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwX:9vDPrfcwcwcusW9nPCU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2612-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections