General

  • Target

    1424-64-0x0000000004170000-0x00000000041AA000-memory.dmp

  • Size

    232KB

  • MD5

    21537e94152c1f32a12be80ebc7635bc

  • SHA1

    286201541440aa81709524e8ee0c955e461c4089

  • SHA256

    b0e9016e34a9bbcca5153a037f596fde2f13f62027179218ec79907797660df7

  • SHA512

    76c2a5b81be87fe78d15a2ac84835907c329863aa216b3de20e6a0488e13fb33f1e4bfdd2e8fc5238a17873faea95e68dc175da73cd5ec4ef5a679516f01011a

  • SSDEEP

    6144:0AzpA6Y/YMLUzbhYJUHTUEACCXy7eL2j4Xsl/Il6UXVe:0Au6Y/YMLUzyyHmfX

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1424-64-0x0000000004170000-0x00000000041AA000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections