General

  • Target

    2856-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    43f9a71cb6f4841a8ef69b29d4b71cdb

  • SHA1

    ab25f8e8047c033eab23208e033aa2a8ada31d98

  • SHA256

    7eccbf492cb5ae449dd49b8d4803b91ae6e12ef76304b1760070d0d1a1e56a3f

  • SHA512

    3de07fba51999bd1d9368b4a659104e09adad64bc2254d25afc2e80090b225abbbb7ace68c9c24cd226ada5f6b755376be2d28e8b66631b3aa13d9593be72457

  • SSDEEP

    3072:JWSdh95txdHz9D0DN6Mm3UDABss/BS9lFQg5rCnkeMW:wSdh95txdHzV0DN6MmEURY9lFQ7nO

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://valvulasthermovalve.cl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    leosoftking1

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2856-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections