General

  • Target

    2356-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    f8f7375ddc74fe0c9a8b219a0871e882

  • SHA1

    166292a01555b9805ce1562b564ae888737690f7

  • SHA256

    adab420e55273a67550c81307e5046f07aa51e2419d307c6af688e7f00968f06

  • SHA512

    b4a2cbb43fb3add1c1b7444c315fee5b3438707a660d758f1df39ee73ad4ab4f7c747465e489c49454778ccd2f77c70c681194b28697b9689c6a28af21f9c3bd

  • SSDEEP

    3072:IdvDPrfY7wcwJwtrkQdYWkybW9nG5oZBCefwK:2vDPrfcwcwcusW9nPCU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    (=8fPSH$KO_!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2356-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections