General
-
Target
2164-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
Sample
231202-vddr4aeb67
-
MD5
422f42e1c0571f0f603d0d01569f1a28
-
SHA1
7f7cab491f2bfe13aa24dd075fe631035ef3ac4c
-
SHA256
d47cfc0227ecd795cd135b789d3353ea408b100c228d07e63dfe88cbc76cd11b
-
SHA512
2765a50b5b4467b045faf595d3d5f68443e6612d2029041dd9eafaf9c94935c436d4a1415394c16a1f8aaf308e6b6ac04681f1c9e6cb78d392eba5c0bf22de17
-
SSDEEP
3072:cys8888xZsHK02U3mO1FwpzT2/O5jISGfyTJG:Rs8888xZsqg351FwpzTEZSG
Behavioral task
behavioral1
Sample
2164-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2164-11-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://valvulasthermovalve.cl - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Targets
-
-
Target
2164-11-0x0000000000400000-0x0000000000442000-memory.dmp
-
Size
264KB
-
MD5
422f42e1c0571f0f603d0d01569f1a28
-
SHA1
7f7cab491f2bfe13aa24dd075fe631035ef3ac4c
-
SHA256
d47cfc0227ecd795cd135b789d3353ea408b100c228d07e63dfe88cbc76cd11b
-
SHA512
2765a50b5b4467b045faf595d3d5f68443e6612d2029041dd9eafaf9c94935c436d4a1415394c16a1f8aaf308e6b6ac04681f1c9e6cb78d392eba5c0bf22de17
-
SSDEEP
3072:cys8888xZsHK02U3mO1FwpzT2/O5jISGfyTJG:Rs8888xZsqg351FwpzTEZSG
Score1/10 -