General

  • Target

    c7a05008c80ac856381ff6b6f5a13a1d05f141cef6bf2344f029eccece987d07

  • Size

    82KB

  • MD5

    ef5b14110892e90d3e5c6a895348d796

  • SHA1

    33b48c3afb4fd665611b785d350f7dcb5026f244

  • SHA256

    c7a05008c80ac856381ff6b6f5a13a1d05f141cef6bf2344f029eccece987d07

  • SHA512

    7763747c310897f244b523973a8b7c645ba1298fb30869ca5d9855ead4ef53e74a3cf9858f08425a4a0b395b2d2462fe6afd008561e5de40c37fb9f9652609be

  • SSDEEP

    1536:CIda1wC+0+prbwhrMBM6eVBu1HXUbIzGr1UgvuAIAXCGJuNZPccX44GX:Ldame+JbwhsMJrk34b1iv8M9cQ4J

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.grupovamex.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    bu%wqhrVi,Qv

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c7a05008c80ac856381ff6b6f5a13a1d05f141cef6bf2344f029eccece987d07
    .zip
  • Winbankcopy.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections