General

  • Target

    1132-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e8dd301749f72b4874a34b3cabb4e07c

  • SHA1

    1ce6763f451692024b241412dfbac62fb4fb466a

  • SHA256

    872e91387f13d49837fc3283780f4b22c7f5b68a7c390ed17efb282668931c9b

  • SHA512

    7d871ba4d4e21a6e251a1afcc2ef0ed767d5049349e7482955fe61fca87031f85a0599ea594831a93e6c176388925ed8246e894d7587e343970038fa8a6b1949

  • SSDEEP

    3072:3u/S52fDfqbLOvh1nTBjgZbfK+yQ85ybNK/te2sozRvtUV:eTrqbL8bTdgLy/gKVeIHG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.itvlahita.com
  • Port:
    21
  • Username:
    archivos
  • Password:
    ucW&8a30

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1132-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections