General

  • Target

    2552-11-0x00000000000A0000-0x00000000000E0000-memory.dmp

  • Size

    256KB

  • MD5

    b2f572f4eb1cd37ccb664df7ebfa0db4

  • SHA1

    3139a856d6d9206ebd7af45627adfef4f2d26182

  • SHA256

    9dd510c6a1b8811e31742536f6e6c66b7c8709b832e43462de112efa1616d596

  • SHA512

    8b55f737b78ff1ffdb6b9b5a56d85c165cf0c69ac72cb0a6b17c82f97b1c2e4ab284aec93f0744aa29ae3abdeccf72868e7d6205902b1ac2f9d503c603326e98

  • SSDEEP

    1536:dDZ3669bFrF3OyGpw7IaLRcTvd5CCSopopMqOSWRTTt5fTA2F4sqKxuOD+N:dbp5OyGpwEO+SJ+fRPt5rgsqKc

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.corpsa.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ko=8J2,OjDt,

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2552-11-0x00000000000A0000-0x00000000000E0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections