General

  • Target

    2416-359-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    7e995d4a7cba78f5f6e3722f356764bf

  • SHA1

    6c1f0d470f7c76dfb435c4bcb202f4efd943a067

  • SHA256

    1e7ccbeef0bea4ecea43a2d1bd4f3e247620f2467cd6627c1ca3b4b4bb02b009

  • SHA512

    57e53547dcbf697d9796fab79cb26bbe92e1050cb2114007bc1734da6408b75c709590514cf8229d0563b3afa13c9be1d33352bc475db5589da210e808e82135

  • SSDEEP

    3072:TkNljwcHLPrnRiQa0gyYEhR5m26Yy5Th7kSY:oNlscHLPrnRiQa07VZd6Ys7X

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    0a4XlE=4t8mz

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2416-359-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections