General

  • Target

    4540-143-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    0b8d7657dea779ed8828e42182daa428

  • SHA1

    de6e9863f0ab2f367bf89813984bcb7d6bed9490

  • SHA256

    e76593906d874363e9b0933727282022adab283ddfbc7cd0bfb5d76dc13f2223

  • SHA512

    d787257a9f3f2ae68b513dd3ec2a1dca59e1a713f1e65e98691672cdae6fa8cedfd07df1c697a970cbd80a23656865de36ed79d0ec1b2e3d3fc0ea7dc353efe1

  • SSDEEP

    6144:3QaOWNtIY9nWcxbNudM3xzRUXIA10N85AdmVuRC/8DycIVvPYxJhORMXq:3QaOWWdncqOJQRD

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 4540-143-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections