General

  • Target

    1600-13-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    67d6ce464404a87c6f0a85506826e623

  • SHA1

    db2ef37fdcf61412269bb8f8432254b324c13425

  • SHA256

    bcb056caf75a951370640687501878b733a56ef93fea7014d9643707908b2724

  • SHA512

    60bd92025509a39c140f9a29fa7b2895e6b0a5b98687135cc6d1446cb9f265d225f50e1e6ebf5462c2fbd17f0d5c4a6d68965deadb847b174969f87b6d17edcf

  • SSDEEP

    3072:O9CboAMYEosXx8E9Fn9aoGpBY8wVi151spsfdU:EPAMYEosXx8En4dp28wglIsV

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    uy,o#mZj8$lY

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-13-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections