General

  • Target

    2744-20-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    f1a2cf03d0a890881d0f9948e5b51659

  • SHA1

    5729068786b952a28e8d20dc174c42165644261e

  • SHA256

    0b0fef229dd57099e9022aeee70758fa4166656fac19d4df19caccc527705507

  • SHA512

    a74a3edd862a69b8a42bd858185ac25412f6f98c6c31d37a984ceafb27d602a5123ff65b4d5fb86e9964e41be9f4d307785f368d1c99573714aea08ea457e277

  • SSDEEP

    3072:K70cnZBhtu/9mIkoEgqEKJikXAvvqKcO7xEoCp501gkA/jz7d6:K70cnZBhtuwkEWyiPa4nXDA/X

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.aktivos.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    6eBS[U_l-x4$

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2744-20-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections