General

  • Target

    4600-11-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    ea1aacf5f1e95832ae7ce70f3db09f70

  • SHA1

    28a3caae8f05662f718e0a01909966037aa93ffe

  • SHA256

    83b201753a283c5011be274793110ac08ca3566f839175542a918a90d9b5ecfa

  • SHA512

    088d821e476005cdde21fb96d76d4e04f9aae7d0164f4e6ba8be14a4ddaf4b26e7de5c4d0d53a9e8e58602299be04d077966dada288bcf158541bf39bc45bb17

  • SSDEEP

    3072:Zgz/KIUVMw0wtLVomveNrafI8ORdel55UWW8qlK:mz/KIUVMw0wtLVomvehaA1RduAb82

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.grupovamex.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    tTgUWMBntHIE

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4600-11-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections