General

  • Target

    2296-62-0x0000000004340000-0x0000000004370000-memory.dmp

  • Size

    192KB

  • MD5

    6e3e3ebb826ab5eb6bdfff358d2a307c

  • SHA1

    14bab7eef49da5e33c4438bc75e2c2397a141d6d

  • SHA256

    084a68e9fe749cb22f80e456493b8629647f234c6a9eef514a62118fc7e4b82f

  • SHA512

    fb5a3c6802b70dfbd1c8980a22316557400eae748ada8f8ddb10485ac532a3c9c813bb1c9e83c758d85bd0e102b5ae36546a5df32e9104a9765dd1d6e57a0c08

  • SSDEEP

    3072:1/wkN/1eZu/kbP0Nm1zPfme/x0tTbIgxa0j0Z6tVnSRoZM7Hz:1/wkN/1eZuCkifdsAg02VnZM

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://almasa.com.pe
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    i($Ei~YKMTZY

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2296-62-0x0000000004340000-0x0000000004370000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections