General

  • Target

    2372-15-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    71ccc7c7f60ff02c5fc09dd76b3c3bcd

  • SHA1

    7772a33c5b610259bf4fa4d58064d9b1503e7694

  • SHA256

    6aa5c9313dcddeae3fd260287a5e9e54c7315a27497bfe32ec41f0549ec48fd8

  • SHA512

    7630f7e2c17911552724fb4f0604c22afb4cdab3b1f752573d653af4e571d012daf3e91667febc2ddacf808f05133c7df131e2ceb397f35f6c8f54dc3d459bca

  • SSDEEP

    3072:gNdbbDRZwjKElYK6WVNcbVBjzp++2Efh53INrHVk:AbbDRZwT7QBjV++18Nj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://80.92.205.47
  • Port:
    21
  • Username:
    delizzasuppl
  • Password:
    99EK7bvTZr4zBnwW

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2372-15-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections