General

  • Target

    2164-185-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    713e45dd8aff96bf6c24e0442673e799

  • SHA1

    43f68a19f8960aa3bcff04e3bf081c81f28fdcd1

  • SHA256

    f3881ecf2a8f80d40a81f621faccf48cedb34af30b057cb651c628198a262e35

  • SHA512

    123076333cc697ddb90c66d74bb80addd12bafd06e7fd51e902562168195def993536116f1ad3302e94b97f0d4a6f884fdceb55ef8da33ec4423c18b956208bb

  • SSDEEP

    3072:AxydbqayiqP0KJEfC+w99dTHo9rG8KaG5jnTqtSjufzz:1xqayiq8T0lsq8KaWT6

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4r@d15PS!-!h

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-185-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections