General

  • Target

    1284-64-0x0000000000640000-0x000000000067A000-memory.dmp

  • Size

    232KB

  • MD5

    236065729434ed8c8dd53dc9881ebf22

  • SHA1

    0aaa4a32e2c006a68c91be087081e1587976cda1

  • SHA256

    9bea56da8de9f8bffe003cf96b7a3f81c50f35f15e5f228f96fd48fd055959e0

  • SHA512

    4b12cbde2d2a063ef01aafd0de5b7712daf208f5e2d09bb4e586ce049d26a55c32c6a4b0f1b3636447122ab64e28648150eb0eebcecb6b6c5e94fb9196f1da89

  • SSDEEP

    6144:RfDerCFEa9bwKBAU7buUsFULRCXy7eL2j4XsfQeLUFdUcBME:Rf6CFEa9bDNfSGq

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1284-64-0x0000000000640000-0x000000000067A000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections