General

  • Target

    3148-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    ba83f7c211571878d7dfba6cc524a103

  • SHA1

    65135937789364d3cbb700ec6f1ae6d5b74c5dc4

  • SHA256

    2346bcf4ede8df502ee166fe0570fb74fe72f733b1fa4ad3fa4f6e3d6fc0a515

  • SHA512

    b1e882d447d2355d667eb4848b8135ba26473f4c3c8a5ad3aaa39aa6324efc63809b1da68a1cc9d6757c24f3f6a0242d7976a3bb5c4b264126deb69ad094cebd

  • SSDEEP

    3072:TTzkimSVM3z//bfQyReOIsuDrx5ayVhDYh:/zkimSVM3z//bfFRxIsuDrDVhc

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.wapination.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    sync@#1235

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3148-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections