General

  • Target

    2056-141-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    45f2f31ea67d81f466d0228a1bad15b4

  • SHA1

    0a95856c4b479620b316f6024f40050a5789277e

  • SHA256

    a27ffb758726ceacad26f3eac412d635e009c167e9a3a6bf73f8c01090d50bb0

  • SHA512

    1cb5dad90b4cbbc032a9300e3d32ecdeb411f5ea6ab90759d1211bad449cc4eed72ea1ac38d167f22a4f3c7c5beec93930925a8aafebea4465a5c5afa186453b

  • SSDEEP

    6144:bbHntUoNkDgrMhVavkGY5RU5Yx6vyHuTuTOVCh4c0STTpgrXi:bbHnnvV8gW

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 2056-141-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections