General

  • Target

    1492-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    45ba017ff14de803e1ec652861a9e5ce

  • SHA1

    9c1f257f2e02aa7ac1e1d0e8a0f50808786d26e6

  • SHA256

    422554c2bc3b50d7bf2d8df7f9e66a4103616cc5514729073cc0618f87e6ed8d

  • SHA512

    66cd863828b42a8a85fe760eb43ba4f9f9669cb0c7753dc845043a3f1ff9c0396cac78b49212d73710197ec3fdbd525c91c008c7f55758dddb5e9fb08074220f

  • SSDEEP

    3072:V726qSCKzkEZP/wjrvIyPqX+XorW5xdJpWpi:U6qSCKzkzPgaM+XorMJ0

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ultraflex.com.mx
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Jgj8-p4Z]a1b

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1492-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections