General

  • Target

    2040-62-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    fbb72004f8f4df7e6c57c25eddb70031

  • SHA1

    4d732124938369cc54b464550c2eac4bc7510c8b

  • SHA256

    1359b1742ad0204f555cfb01c727a6b71801d19c0635f88d7e6470e12bac1462

  • SHA512

    296bec06937b7ed37eb67c0358b35a46731e757651d33d1f74f572f7eea05000b1df8fe09f07b769fbedccbaa9f2716ce133cd7650642e97d573b6a1385dfd2c

  • SSDEEP

    6144:z51/KeNWYRvw1iyyQGyE3Z6TTUENA10N85AdmVuQOKV+7QnBTyhX:z51/KVMybey

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 2040-62-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections