General

  • Target

    4932-50-0x0000000000F80000-0x00000000021D4000-memory.dmp

  • Size

    18.3MB

  • MD5

    c81d2ae5e5edaaad7c18660a3bc73c70

  • SHA1

    6ac66b54d7eb88f00a422fc4a1a5600287ddfb98

  • SHA256

    11b23a184ad215b37c54d28f29cfea800f06ff0e4deea5c6c9202c6caa3b6efb

  • SHA512

    caccfb4f5d7828ce93637fedb4466ecfac29b78d940dc3d4baea2ab3b7c89466af4b2ff568449bbc4334e9fc65fbf81a75ee4a2bb7a17d8798e90138338c9bd7

  • SSDEEP

    3072:9PnzKtEu2emeYTCvsc3i/43h0P4SPEm5xrosSyKn:9Oqu2emeYT6scS/yI4SPEzslK

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4932-50-0x0000000000F80000-0x00000000021D4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections