General

  • Target

    1856-60-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    385341437a8eaac5149c6560a48ebf70

  • SHA1

    ebad0d549b6ae8074e43e59cfaceb6d70b81aa16

  • SHA256

    671d719a172fddfddfb4c750f30a9e60c60b26a55568ea5bfd8a4430d9d51b2a

  • SHA512

    6e199728233d75c6fe85c7731ad84fb572ac04dee2b689035bb499e59db4dc55ebf9ee5149eea360eddc5efb19b6b2654b0677f9bff0dbe7ff35cf2737bee0e1

  • SSDEEP

    6144:7GAYNAxsFz5OuS8SsaRGpBrUL+vyHuTuTOVChGunoE8ZTwCjSX:7GAYNVa0ZBj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1856-60-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections