General

  • Target

    c3a217a3da01a5dc5b8b91c01c7fbac2d3d8f7f186f3add34693d77ffe876fb4

  • Size

    164KB

  • MD5

    d3d68d388eaf3ba81fd5cd81eb122d44

  • SHA1

    023e8318ca5293560c6201d336a349e1680a0407

  • SHA256

    c3a217a3da01a5dc5b8b91c01c7fbac2d3d8f7f186f3add34693d77ffe876fb4

  • SHA512

    074a307921672d878f95547a222a29ab6440e40d222fea7a7db18cad404781eabd264561aaa486d0113f4599bfb7768dd748ac86ebef6f768f425c14187570b6

  • SSDEEP

    3072:qje5IJ467tO9Ui1zHusMzkk9OvfJWlwu9ejgIlp3NgOFNrV:LX67tP47R69OywYkp9rh

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.richenqtex.me
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    $$Success@2023

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c3a217a3da01a5dc5b8b91c01c7fbac2d3d8f7f186f3add34693d77ffe876fb4
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections