General

  • Target

    1632-59-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    c36bb0046cbd5052867f8d4a02301f22

  • SHA1

    617b16bf0efc1f2abcbab4e07779316658d26d59

  • SHA256

    c05515006665a374676d57a8836f9e5b33ca25e78c4520658e127deb34758e02

  • SHA512

    444bc171bfa3976abb2e23ac7c04bf8ce782764a2c0f8aea22660b86eda2c382c846713d4490218aba72958f213d1787e5ed19a0c4cb07356e946178d144d7bc

  • SSDEEP

    6144:crjlWCmFoYWV5F5YW05D1TgOIUUsiCXy7eL2j4Xszckeg1kuMxtYyETiwrwX:crjlW+m5Xsew

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1632-59-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections