General

  • Target

    2352-4902-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    97f11b9f23497bffdd55e6a7bc7f463c

  • SHA1

    5e6306cd4da491d1e2de87f873c52ac59e081ef1

  • SHA256

    7aeffa735476e455ddc55aa16c4879da45cde2c59a6b4d39cb4aab0e536c9aa8

  • SHA512

    c43e18ca2d9c9f639e6dea17e6c50f4148d63387671ef1ef5926533f9f18a25f791c26fe92b115c9cadf7b7dc428a9778bbdfed3bbc53253067e691d946d6cc3

  • SSDEEP

    3072:unlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAs5:AHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2352-4902-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections