General

  • Target

    2992-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    66500beef36f4b6853f9c6601225cbf0

  • SHA1

    3c3d05748a6fd2c8521a0c639c23a9889c016a54

  • SHA256

    64d18947f09961467ea7507f0821df03c1d20a78e96e16129637a36a33401926

  • SHA512

    a0ab0b933d2db968741b06e5ca6d727387737e4869fb9426dcaee0ba8fac803949a63077ecb854e942502a332ee9cb139939b5d7df8e8c5c34a7d91b565c5acf

  • SSDEEP

    3072:58olGgUAMw5dYrM/sRloZY9yOZPs5F0SllhN:2o0gUAMwkY/fZY4OBilD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.gizemetiket.com.tr
  • Port:
    21
  • Username:
    pgizemM6
  • Password:
    giz95Ffg

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2992-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections