General

  • Target

    ddf6071dc6a133cac9d72813d05e5d3231e65136dd68083e08796c38778f5bcc

  • Size

    84KB

  • MD5

    96b64dd6f7c74e339e58663df3c57b3d

  • SHA1

    4aa14e87248047c67c1e969bf06115ce763fd7da

  • SHA256

    ddf6071dc6a133cac9d72813d05e5d3231e65136dd68083e08796c38778f5bcc

  • SHA512

    cd4fa3d5fba70a37aea8c7128daab42c89745b9107d8822e51e376be4481acb4d0fc4c47e274fc7e179739d49793fff82e2e3c6774f27ef48af26a66209036eb

  • SSDEEP

    1536:64rsLU1EIgtVgnCjeyUniz90RdzT5JMvYqvKNZelnWz+tzwHMesq7AagFimg+h0:6IsLsEIwsCXuYu9qKNkWz+9I7GK+K

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    q.15SE~j1@};

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ddf6071dc6a133cac9d72813d05e5d3231e65136dd68083e08796c38778f5bcc
    .zip

    Password: infected

  • 93ee7308d3073782266ccbfca04d483aa35c95becff7a80326d65f615b777676.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections