General

  • Target

    2320-11-0x0000000005170000-0x00000000051B2000-memory.dmp

  • Size

    264KB

  • MD5

    d8d93adc54713246b25be27435456a11

  • SHA1

    de2c0fe3e18e5e69bb41289ab36669ef677f1765

  • SHA256

    c3cbb554c37ca7bc4bf98724786abe9d385a54ea33e99fdb6c6f4c7657b23a63

  • SHA512

    81b675a9867a598d0d998da9849e12ba87322c69c7c95af163018d88d2f4883dc86cf50862d24cf01598487201e9f6d74ee67d1201493adbefb2eb9af18dd04b

  • SSDEEP

    3072:aQYWwEgsgSh73KAG9ifNZG04jGD5/xh7YXaovM1M:7YWwEgsgSh73KL9ifm04yVb7Bv1M

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.jeepcommerce.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Cgn+Udqt0F%y

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2320-11-0x0000000005170000-0x00000000051B2000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections