General

  • Target

    2112-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    89271acbc9df61353d87f2774c960eb9

  • SHA1

    b785e9c70469066211faf67ef69c88c2274835df

  • SHA256

    34754920fa928b114c86ae2e6ee5ffaf7ec2313494dea61ba93f3c5527b063d0

  • SHA512

    3bebd5af432377c91ad98a1f33490c37194603895f8a055d7db3b6d2495575f516728856f3704999324493133d48d858322134f8476ab186d46a40a246843dc3

  • SSDEEP

    3072:HdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwK:9vDPrfcwcwcusW9nPCU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2112-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections