General

  • Target

    3052-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    3bbc153459a8831ee13b864f5f895cc7

  • SHA1

    3556078ab4ced3f9830b33e68a724e88708640be

  • SHA256

    c63e50b60a084ca0002f77109243bc4bdbdfc3d4cd2844c5632e1d8b73b6d71f

  • SHA512

    f9b4f67888e225f1348bcbf9520063965e37a38bf37ca592b5bbcc525c7314c7c4874c0205a02a020adaa7fd1ff966f46c6bdadcb9923731649145ae1846bcc9

  • SSDEEP

    3072:iJl23x1ZVB0a1tVHNgS/RhnFQYWMVtwhK5MARxhYB:eex1ZVBh1DyS/TTdVtwhORP

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.siscop.com.co
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    +5s48Ia2&-(t

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections