General

  • Target

    1752-63-0x0000000004DD0000-0x0000000004E0A000-memory.dmp

  • Size

    232KB

  • MD5

    767bf7ee3e283db7385c5393cf94d371

  • SHA1

    2b4c840be9b5e994b614f98e3b04345d07caba49

  • SHA256

    31a88dd2eeb7a78a9b61fba675f63579ba6bb76b4504e1a3bf488d590433c72c

  • SHA512

    cf0a5f8bbaaea548173d0ba0f39a71053382485b2149023a499c711559720fdee9bae034bef4cdd4562568f52819c3f5d55772f235cb955e6dba46fa1c38a8f4

  • SSDEEP

    6144:PYuWW5dG0wuv7Z0GB18GqzrU2aqvyHuTuTOVCh0yU82iZSS/VX:PYuWW11oI/

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1752-63-0x0000000004DD0000-0x0000000004E0A000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections