General

  • Target

    3432-195-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    113c828111a92f96b949367af51a7d1c

  • SHA1

    9db33bcb45bc5c41de0ebfb6c8dbce9144cc53f4

  • SHA256

    0152f7e05612fba8c34fd97d357ed08c26f7963f3493be53d51bd0163765325d

  • SHA512

    0a0b272e135f79f3cdd938b580be1a75eb0987d52cfb1bbcba1a7560ce01a34d12812e8aa5c704f2933760d7a2bbc49996fa0b0064590752c58245ecbebd0fcc

  • SSDEEP

    6144:niSIlTUMNyssYCL96zWc372UF9CrA10N85AdmVuOyD77umjnqbL9X:niSIMwW69ePiL

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 3432-195-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections