General

  • Target

    2336-29-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    9519126347d4df398377fbab41297539

  • SHA1

    d8c28674c62e4a3883af1868e3f163ca90560b9d

  • SHA256

    7ee2db3abf144c97dbfdefec57e50aff7fa66f46951af67b837dbdb5e175b739

  • SHA512

    bedd927593ccb8239f82529d96af99b126bb28936659535b29b2eccb4d4802d06a8038790d8ee7ec0f5327dc5f18f3d32287771c7ee20d6e969ddc55c4307721

  • SSDEEP

    3072:Hnskp28m14841LUjcOjfrYWu7rFB3YM4PJaE6pKWF87:MnJ41LwjsWu7RBZE6pR8

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aktivos.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HQa.!B(6HMtA

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2336-29-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections