General

  • Target

    2136-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    c96876e22cd5fede5e5e8370ba3ac812

  • SHA1

    caca7128dbf73e95b7e1a9b76260b698b706d768

  • SHA256

    5866de639524bdd54e5c36e1c90490c6c9743f9e49a04a7db5a975edbb5b51c6

  • SHA512

    1e0ebbdf49be075b5e79a42ed50971c84a3f994876d3a5d1617141002caa07bcfdc10f66a8b36e8e9361cadef9168bb37223282357648d55695ab27a890f11ef

  • SSDEEP

    3072:iJl23x1ZVB0a1tVHNgS/RhnFQYWMVtwhK5MARxhY3:eex1ZVBh1DyS/TTdVtwhORP

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.siscop.com.co
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    +5s48Ia2&-(t

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2136-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections