General

  • Target

    2556-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    79adee9cc831920cdf940ebc16d0500a

  • SHA1

    1794cee15e2ff1370725f89c2a42c76c7bd8d647

  • SHA256

    fabd85b69a710df8f324861060659446c07fdf29640842099a641598cb438ed3

  • SHA512

    c254cb7ee3a8815678b4f9638023c479df0ca2bfe5d8127c8b8b380ab942672490235c3297b5878f9f8063246642f7afd09e0fb657c32d517fc282794a53cafd

  • SSDEEP

    3072:hv4kaaq6KGtInoB4Xpt1VqQ2y6GQGGCT5egOo+mP:F4kaaq6KGyoPy6GQGGCZOpm

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://s3.serv00.com
  • Port:
    21
  • Username:
    f9226_jono
  • Password:
    Ogasa56#@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2556-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections