General

  • Target

    2272-4826-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    2e7df0e4fbd4efbc2ea4c7bc84140237

  • SHA1

    9dbc96f6ba108615e6f0b2e53cf0390a1e8641eb

  • SHA256

    5e44c475ab600c231065169b597025801cc4d597e77b8e693cf22a1ef74287f1

  • SHA512

    592eb3246dbfd8d24a45de896e8610e51359cd1f529980bb21364e8a6e108786dda333734e6801dd843e729f3d5c80c1a1933d7eda9fedf63208ddf8ae45adab

  • SSDEEP

    3072:unlIk7HzX73xexj4cxKlVI6ngoYWUb2jy51/TeAs5:AHzX738xj4tnKtb2jAT3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2272-4826-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections