General

  • Target

    3484-140-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    2a62e6cc27c17e7fa1184169e4306a2d

  • SHA1

    8bb457c643152a7a158ec0636db51f881916cd66

  • SHA256

    16f3340ebe6888a316f074d7bdb081682355fc40453e0040c005c08f4a8eb2b2

  • SHA512

    38c3037e4443717d7f8f576aa9b2d42317e63c985336ed12387df098d25122bd0a7acba39800636822e6a68ff10e82067f69521a73b63a220614276ad98967dc

  • SSDEEP

    6144:lFbt1LSz0zIrsuDcpnEdTIUdy/QezKDyf+bgzQcegiHW64dlvYjA:lFbt+oEL4zvr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 3484-140-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections