General

  • Target

    1224-64-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    ad436d718f76fff9b68e6696eda8d4b8

  • SHA1

    72c3c14ed3f0a0ae69385f30c7723793f8fb005e

  • SHA256

    a0312b989a8840e3cdca619a6db5e3ba994d8a8a6db2d4f4c90e9b2a625a93ef

  • SHA512

    c3fd04cf25c8f3e6f96e9ab85ef9a404de52c9d0b846708e7010a94c6bfb6305cd31b5df17460ec816a28112c80a33c92a27fb70aebad899c883851474bdad6b

  • SSDEEP

    6144:a0lg7kKO5c6xxmmTmwC6ma3swvUErBkFctYB8XkPdDLBXx9H1L:a0lg7kKO5c6xxQtaZyXx9H

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1224-64-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections