General

  • Target

    2388-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    6c9e6b7575167b722f67c88df6d419d9

  • SHA1

    c294f1b9ff23c04db2b3eea0e62ed3264d090fbd

  • SHA256

    2a94e8935389129dbf75b380ea3c0d31db237cbb011dfd90c7abeb959506b12b

  • SHA512

    bbfd15ca8e3240a4ece1a315ad6cf0da73baa0a782e67ecf27b5fc415876115503cd5ae4b89475703574b3c6624c2de3cab57395eb2db0e4b91b9548dd5c1a19

  • SSDEEP

    3072:6nlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAsm:UHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2388-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections