General

  • Target

    472-67-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    1ae06ee9634583f85bf2ff1f5b63ba73

  • SHA1

    92d55008c3bb92b170650b3014c27d42517a4a61

  • SHA256

    aafa46c43789272ce6c150e77d124fe7cdaa0aa723262d45ab120883c9f485f9

  • SHA512

    d6b00fc61b2de22634af025ef2c616821e273d31ccd38ce7733f0532cfaaf7fc6766d7b2d16d7b997739c5349486da6adb1b371ae58dae3710af62d27566e13c

  • SSDEEP

    6144:UXxjmuTIxOoKAmi87RX6auUcyS/qj+T+jo/8+WB3gW//KfX:tuTvogi8tC4K

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 472-67-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections