General

  • Target

    2012-62-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    a770ef184a7a62ed86d6256de086a9bf

  • SHA1

    8601822284dd22b8178cb3261a7422ef2f71a1e6

  • SHA256

    1e9b0f0078ee5042c625ae134040dc57adbe42ef3848168ef691efa64c0fc969

  • SHA512

    ad61a0374a162196aff774862e8dde6ba60c2948010f897e389c5a6cb4f65d7eb23faaf5990ea74fe0287b95497fe19796dc3f19ebd10f691371276c5e5b28a0

  • SSDEEP

    6144:pXxjmtnz0yBGeo6ZOZRkouUozlS/qj+T+jo/80hbVxDAx/8YJX:utnIcG8ZORqq4xEY

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 2012-62-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections