General

  • Target

    1372-60-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    065bcf31f945529632d75d2f7f7ee54a

  • SHA1

    0daa300bb08d37a2181c92c96b64886ab2d89eb9

  • SHA256

    1f84c4c7eab9b193b3de729f700f7c35ff459c3a092dd76c36fc61389a6f8822

  • SHA512

    4efce5b485ac2514d56abec78a2b1b2d4f96d1bd540543de1dc945430f780e488cff9b6a0776e9cca5a947ee2754cf7a86cfe76813f8a25768524c59354f809d

  • SSDEEP

    6144:v9BgI1PhYS2OHvX++7uUkAEJAp4lkhap6u22QzEVte:v9B/PhYS2CucJEV

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1372-60-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections