General

  • Target

    2624-15-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    9d3e9ec59464b0eb195ed6d236bd0999

  • SHA1

    e2af574d234b18666ab1b066c669c30b598a426d

  • SHA256

    70716d9024f32e52e23be0552dce8fcd45817bfc68c69d228ee8ff1cd0fe58fa

  • SHA512

    7a40dcd03e714cf46330221edc98225722430691630f1a8b55bc84ad239bcdd114ce97b7532b147a1b216f85255b5201c80b26dec32b3dd0decc325e7e72a83c

  • SSDEEP

    3072:jVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/R:KlqdAcY8gKyKGrY5WdXo5BCQ/vG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2624-15-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections