General

  • Target

    2580-11-0x0000000000090000-0x00000000000D2000-memory.dmp

  • Size

    264KB

  • MD5

    73f2c9a9d9a02cc11e73cbe8337f7ae0

  • SHA1

    4b878e48eeb832442d733d4c976b17a5f6207bda

  • SHA256

    3995cdd9cefbe70ed63b260be1395409cb8f9f23f0daed4b93c9f068ba6bd1ce

  • SHA512

    2db33c710685af945c2b121c0968fdbffb25e03af331edd1020c5ba8f05c80c0ac71555ff327f6ab2f3f00ec380356310bd2e0339a48459158180b0b95f7f95d

  • SSDEEP

    3072:YWaKZ2yui2P2eVjyRI5hNixUnYWb0WLr5IDEPLHh/:F32yui2P2Qjy07ixUYu0WLaEr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    q.15SE~j1@};

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-11-0x0000000000090000-0x00000000000D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections