General

  • Target

    1252-67-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    5a42e0e2eeec59bde43aa31e46ea5364

  • SHA1

    79d34304bf1dca49137063a8060800cb8dad3d04

  • SHA256

    da889c71b8d2c6a6ecb3cbb3a33b4e4c41274004db5fd06059f588052ee2bfab

  • SHA512

    09f487f801ee316a1b2ffd8ad51d3e3c4855a2a8cf89d0a0ec39f857099e12e72a58ffdb23c9fd37cab048f89f3ef525c6087579228d6ee81f169f85c91de8e0

  • SSDEEP

    6144:PIthH5kQKHxrjyfUhxKsJYRg1sBKZiad3UKEXTDqx/n0m:PIt15kQmBywd

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1252-67-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections