General

  • Target

    1052-69-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    08a7996dd976db58aeb92aa2a252f0d7

  • SHA1

    7bd3275759ca01822178eb22c11ed6b7aec460ef

  • SHA256

    d63010ff0610a4b498e6b283c7c211d92bb2f46753755df08327dfa3d8b04937

  • SHA512

    558f5d16745cd40ec7cf96b64527f994a1fa887a7ab7e67fadec68e519faf19e7f63010eb5431fefcc25a64081212fbcd36c2b108f4c5e4c0bcdde982d70b42a

  • SSDEEP

    3072:0GWEVfkf9iHSkcxJ6lA9Us/y63a8z5R6mpmATXNCsIfrqap8iIPdHwSqGCywtWps:0ISk4JAsUp65Gm7LkppVGdQSrfUW

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.gettoner.com.mx/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    fedxunited543@

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1052-69-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections