General

  • Target

    2652-159-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    255cf3abdf4c02127580d83f0ec4f22e

  • SHA1

    0c9ac20751be4b564ac69b0bbdc506d53da49554

  • SHA256

    0baffaac7265ff2983ff061f1670d7007b5f552cf646afce497557755bb5269d

  • SHA512

    716f25bdd0c77917031a42afa24eea61830b02f3f1a97fcd2fa4527a248d71aa4f4d14998c17b3549abdad0beaf1694d081e1dc88bccb1b8c7c6e46dbc19e73a

  • SSDEEP

    3072:K70cnZBhtu/9mIkoEgqEKJikXAvvqKcO7xEoCp501gkA/jz7d6:K70cnZBhtuwkEWyiPa4nXDA/X

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aktivos.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    6eBS[U_l-x4$

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2652-159-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections