General

  • Target

    3016-3-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    33346632fc9d38d31056588383bf1c73

  • SHA1

    7fc1bb4b24102ff463e98cf57ce6f39515e9706e

  • SHA256

    1e0773508cd7d14df7435466009f1454ce70b6c2d99d3f1f973d07bfcf5b1cda

  • SHA512

    61df87d4d636d8b027b48c9c2354a5436a7d247a9d2ac17531729f63f9d9745820ff19e1de7565d5f0bcc115f97b48f2f03de137335c98249c98cf8f9c322f89

  • SSDEEP

    3072:V16dXiXCyPbXKi14T2xYcEcGi71KZ55KZGCr2r:n6EXLPbXKi1462nJi71KZgGO

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    nXe0M~WkW&nJ

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3016-3-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections