General

  • Target

    2280-20-0x0000000000110000-0x0000000000152000-memory.dmp

  • Size

    264KB

  • MD5

    b86234744cb34e1435cfe70a52c19d66

  • SHA1

    f4a4bd48b9e21c4704caa0d237842922b9b6096b

  • SHA256

    f528b6e928febea5744efa9b6a732031e03c4e54b96a41b8d87204b79e0ecc92

  • SHA512

    07a1e1ebe1d100cbdd1476650aac1818b39ed2f5b54dff017796ca370c7539be1fea57e768fccfe47b999b03544b1e7999b972e4c12e6b31126080bd12b7db86

  • SSDEEP

    3072:LnlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAsF:pHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2280-20-0x0000000000110000-0x0000000000152000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections