General

  • Target

    1200-62-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    5944f581ef891a917dfa98e0a49fa5d7

  • SHA1

    8b0016d669497c1789a755a2b0328bb643849c29

  • SHA256

    9dfc3fa624534d475dc3bade63c3442f71dce66ef846651b58e87e2f7fc7f357

  • SHA512

    b9c1d4f6f396c42e3f72d87acb192fb751ab1db6d0f335c724f1c1fb76f2b521c721a7a6acd21f8366d36b2eae0dbb17ece38915f33f3cba1f2ac261448339c5

  • SSDEEP

    6144:bbHntUoNkDgrMhVavkGY5RU5Yx6vyHuTuTOVCh4c0STTpgrXi:bbHnnvV8gW

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1200-62-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections