General

  • Target

    808-117-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    874a41838a99a66cd386db0b93d68f77

  • SHA1

    c2b27e8ab6823f61abe5400987e7bb541d81bf2f

  • SHA256

    7c965e872f2847f42a614f9bdb4ff7270f04779c23d47af2688110d175bb66ff

  • SHA512

    92ee27925cd86d8291b03e76423255882014c9a2a2dcce6cad82c6d66300107a04c6e4b35f2d94bbc3b0bf7f4c6c64fb44f39ce70236adedc101fd821f27dce1

  • SSDEEP

    3072:YWaKZ2yui2P2eVjyRI5hNixUnYWb0WLr5IDEPLHhl:F32yui2P2Qjy07ixUYu0WLaEr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    q.15SE~j1@};

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 808-117-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections