General

  • Target

    2680-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    4316b3da6bd51ef9a4caf8711bea3775

  • SHA1

    fd3224f4f522f566fe0fe1180390e2287712ff05

  • SHA256

    c802a0b1b5fe4cc4d725fce910235ce3027de0ba9de224fe9ff8759a8ada7f08

  • SHA512

    6d40411e7bdfd60df37ed206b310eae689b3a5fb03fb8619d7102c2d4dd70a66edb61fb16656d16bda3ca664d751edfc48a03055700fa4b5bd9c421b5f6a777d

  • SSDEEP

    3072:HmpZgsw0w8vBgsN6FsPveoIFnA7yF5xGTYVn:GpZgsw0w8vBgsN6mPvlMA2ETg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://cash4cars.nz
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -[([pqM~nGA4

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2680-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections