General

  • Target

    1160-156-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    c12220bd9aa63d41fb682cf39571fe90

  • SHA1

    d6739d87eda12f72994816237e1b1c934b19e1e3

  • SHA256

    fd5e3532fbd7c8854c77b60a69b744c1613807ce5371a6b45807713d7f5c8f6d

  • SHA512

    39034cfea8d07f81495875abef53fd35163ce8c3ab12f059c6c56fa4e9d10d50ed0877c2bc371a123ac37d5f9f3dd08b886778dff77955df478495538b9f7ce0

  • SSDEEP

    3072:6nlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAs5:UHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1160-156-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections