General

  • Target

    2492-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    86933976506ac177c7d2d8d9e063831d

  • SHA1

    99e3f1c6ff0f9eeefcdf3e6121d4c178d84596ea

  • SHA256

    727c7609b9ab7cfc69c0f61acb151f30cb902cb85de397465e5e5834ad959853

  • SHA512

    5b99346a49db1c02e8011d989cf7193d6ef872730a5484c93d5604c8178ff654ccfc184f02623a74735d15dd4696224c84562788535818b0ba67d39ebdb68588

  • SSDEEP

    3072:HdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwM:9vDPrfcwcwcusW9nPCU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2492-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections