General

  • Target

    2164-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    422f42e1c0571f0f603d0d01569f1a28

  • SHA1

    7f7cab491f2bfe13aa24dd075fe631035ef3ac4c

  • SHA256

    d47cfc0227ecd795cd135b789d3353ea408b100c228d07e63dfe88cbc76cd11b

  • SHA512

    2765a50b5b4467b045faf595d3d5f68443e6612d2029041dd9eafaf9c94935c436d4a1415394c16a1f8aaf308e6b6ac04681f1c9e6cb78d392eba5c0bf22de17

  • SSDEEP

    3072:cys8888xZsHK02U3mO1FwpzT2/O5jISGfyTJG:Rs8888xZsqg351FwpzTEZSG

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://valvulasthermovalve.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    LILKOOLL14!!

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections