General

  • Target

    2556-11-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    e8f93c736e99268d9d3745bccbca83e2

  • SHA1

    1d5c8639abad7f4efab50a6d4e4d85bdc1539c3a

  • SHA256

    fba87895aa8686c83667d20f910ca82ee5683fd383040860bcb973946f459deb

  • SHA512

    94debcf1e27b66287eb028e3e407c1d9eea7153d72b902d30364af8ed68beffe511f76a9a735e67348b918a87a9e3959e563529112f4d0a59852e22c83ebc21a

  • SSDEEP

    3072:w8olGgUAMw5dYrM/sRloZY9yOZPs5F0SllhN:no0gUAMwkY/fZY4OBilD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.gizemetiket.com.tr
  • Port:
    21
  • Username:
    pgizemM6
  • Password:
    giz95Ffg

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2556-11-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections