General

  • Target

    2352-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    5d22f31a3b668f7d494b6cf93146bf41

  • SHA1

    67bb615ea5ba0a2e2975161ee1dfcf8a0fde49ba

  • SHA256

    6d1cab84fcfad3df553fb1236576afd76cf409439ee99fd07f0a362d4402a966

  • SHA512

    cacae0e7a65727c0dc062079b1326a1b077a18cd08b7115d9d436561f8eceb06129abdd3ce2d1a1667ba3ab97d447d8647e9237a28338989ef4c5e48073e8b68

  • SSDEEP

    3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/q:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2352-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections