General

  • Target

    1096-82-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    5c1e3b872aac92e5e2742f62d610cc1d

  • SHA1

    304de62f1ea00e92468fa604958b47843728bc17

  • SHA256

    ecc2533ebdf5d1d81fbf200e41867834455c18ed81fe18e0da478f5e688e3c56

  • SHA512

    f56d6ecf77069480ed908bc2dc0043594ed8f1fe52fd1f8ddcec1cb5c7a9bc0facf3edaa4e0003f87dc3a7760cdc8da5387766b526df8a6c24d8d8ac0f45eeb5

  • SSDEEP

    6144:pz/Ygy0/5QA6gDwAvJ03IGUSueYA10N85AdmVujUwEuaokQTMVHX:pz/YUnJ0ugGTMV

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1096-82-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections