General

  • Target

    2004-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    8c2889a6b86cf9b370ab946658e4d1ce

  • SHA1

    0554619b89e9844f51d618fa77d2c7b0d8ccb9fb

  • SHA256

    9a7e16b572ee0d70ba2c20d23a28d61230bdc517a0a0deb2a8dfeb308ac5e863

  • SHA512

    3474f2a4900d24aa31067ee0119751bf101d1c1a063d9225b06a6fdbc80b5146debdc228b3c794691b3b9932abb12a5ad58154de270ecdabaa9885d8d11c4a45

  • SSDEEP

    6144:0BXGWWmdg91J806zTM8Z1LbPUFTjzCXy7eL2j4XsP4X68K0YJuQ3X:0BXGWfk8gQXYUQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 2004-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections