General

  • Target

    4404-133-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    65dd0f6f291336c4e776ff3854cdc624

  • SHA1

    489bbcd20a465d40eb3017da6258e440b28e071e

  • SHA256

    f0993b9bc7d377c3cfd92116d725d1d556a5511fcf964c51d281d3c7b0c597dd

  • SHA512

    4edc0e759ace3e89104fcc312a5529900529c4558f3a99a3db477b985647f4ab9649b41875a74daa664318bf564cc95bf845f520274d06638202a3ee22ebda74

  • SSDEEP

    6144:7GAYNAxsFz5OuS8SsaRGpBrUL+vyHuTuTOVChGunoE8ZTwCjSX:7GAYNVa0ZBj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 4404-133-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections