General

  • Target

    2328-143-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    027234a113424a69b1cee67985b8a117

  • SHA1

    ea71332b219f6d70b9ffe733e85c31c3ac338316

  • SHA256

    9ebb9258685a9edbf4cbd6b44fa98c375f2b60af55008834d6666a8a7ceb7bfe

  • SHA512

    2050fb4d76cc8b4d0e78cc43cc5183654d97a50d9bc702b142e8b1fd783179651768dc561fd6135e80263b2d63799c8cb275a7a8f16b6c6c07231d14d89859ac

  • SSDEEP

    3072:6nlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAs:UHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2328-143-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections