General

  • Target

    2552-15-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    7daab1294af0f87e59a6748c522b70c6

  • SHA1

    68655ea44c531c3f5d33650f79c9d3dc53f83aea

  • SHA256

    a50d53fcdc79c49c2c8e58915bf5727f0ea33546a993b466f6bd34e40769f84d

  • SHA512

    38407cce5bea60257ccb40b64b0cd1ba994d1e9b27b9bbad3d6e4f2f7788617411b5af10963adda6ad9d18bc5cb5ede5037ddaf2d21b890b93def75ee0d01877

  • SSDEEP

    3072:uPnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKf:uOqu2emeYT6scS/yI4SPEzslK

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2552-15-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections