General

  • Target

    2868-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    15dda303efcdc48c2be548b7ccacd06f

  • SHA1

    22ac404a54f22e3ce8c6367329ed989fc9eea363

  • SHA256

    b4448abb2c1fd51a73ef5c5e88196998bcd2d0bd553e729bf18739069bd85e8e

  • SHA512

    cac698140dd24c1d0cf78840392ff0eb1e941ee497297f67d2c3ad5afd86a48a341215f7ab3ab163e8b456be570bac1d176ad60f4ab628b3573a45e99fe29529

  • SSDEEP

    3072:3u/S52fDfqbLOvh1nTBjgZbfK+yQ85ybNK/te2sozRvtUVR:eTrqbL8bTdgLy/gKVeIHG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.itvlahita.com
  • Port:
    21
  • Username:
    archivos
  • Password:
    ucW&8a30

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2868-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections