General

  • Target

    4888-134-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    d0e99dd92d3e188a2f5d370f21bf8d4f

  • SHA1

    db074784b6c9289faab664f9b3ebb45b4af9d355

  • SHA256

    7f7ca6aed15fb8e547311b40f9a7e111085b738d7080fb1d8757f7e53053130d

  • SHA512

    c5dbda994216cd660b9b4984de59fa1b97ed53a509d47682e8b6d2ebfca46bec1864ccf062499cc1259440db95a85836f3281ac04d13af6cc4efcd30c147bb9a

  • SSDEEP

    6144:Ev9sMx6nLcSLkLPdR8xUpqn6bi7m/6x65mANQztsnbfuGfvX:Ev9sMQLiLPdNBbf3f

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 4888-134-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections