General

  • Target

    3008-2-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    5c97e4a6418787a11654a3d58adb4275

  • SHA1

    cbf7e0499924bce3599a9bed1b0c2926f7c906bc

  • SHA256

    e04e0ad72685217d80e050f4520b899fec346e1c81f0a34069a591a0f6692790

  • SHA512

    fe238461c3af5b632a7a9ec8886e61a3fff571bf4bd8dd889d051cf15cba8feaf5df3bae53eef023010b55f829d7fb15e999f82e1a53a04e72b79bde0df893f4

  • SSDEEP

    3072:39w2DzTDDO66DVnOK8jbZo/Gd8oh5u+A5oQY1:322DzTDDOH9v/Gd8olAeQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://s4.serv00.com
  • Port:
    21
  • Username:
    f2241_dol
  • Password:
    Doll900#@

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3008-2-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections