General

  • Target

    2880-202-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    551fa04e052de1c90f86202f6e736540

  • SHA1

    74cb9b096a895732c665cf5b81ff2ce94d5d2aee

  • SHA256

    714905a4408e002b6df972bfb55af41e9f4fb4f839597480e43d9ec1b2bd9ae9

  • SHA512

    5c456009db54e17d407a85dcba4c76fa0076b96c6e86bb7c9206e24b82d83ab634f12ea0b1a90f7f451d73a44307fdd3e0322a1d7249c788208c144e6096a291

  • SSDEEP

    3072:hVgrpqdAcY8gg3yV/nUGukY5I3UZUmYWB5BCQv5ygvW9/R:QlqdAcY8gKyKGrY5WdXo5BCQ/vG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2880-202-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections