General

  • Target

    2648-18-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    510d9a7076aeed01f2bd16c18320c003

  • SHA1

    645ecd6bead6af05c8390ca7786f1e5095ec5589

  • SHA256

    0923851b7da5ab54a23cccf93cc36a5f25e3372bde76274c4186f96f37037b6c

  • SHA512

    617cfad607236838369db55015ddc96f7c8cb87756b7a077a3ed0e67666167a8a98606123ee9cd72c11f88f726cab7739460d7a0f338eddce3388ce3d429c71d

  • SSDEEP

    1536:DHSl55YAvw8gUAjkxheaMLu58iCAyB5xkn9+WHm09ceo2zS+5RmNxs4OLk+FsDqn:DGPxvw8gUAjDaTMk+hehS+5wNJOLk+

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.tekserendustriyel.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    chuzy2024@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-18-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections