General

  • Target

    1644-4899-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    99d5856fbbd501dedaee0f357f3ac73e

  • SHA1

    504c0cd7bbb30a915210d6e21640ebfe85d31d45

  • SHA256

    77b383cf4a76fef391ab04ef1c5863ed86c4b8ac42ea8a52eab65a0b056fdf2f

  • SHA512

    14d4b5a1e5b98a5f8bf5de422feab3e743011004396fa8b88c515b15eeacc2bf27d21c2d1c16c5ee0cbc0b1e502f760ffb4d365bd7b94dd2b94bd5de3748a1c7

  • SSDEEP

    3072:/nlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAs5:lHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-4899-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections