General

  • Target

    1900-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    7574be8f4696bd4706474e1f0b67b59c

  • SHA1

    b79a88134a7622506adabb87b4b77597fa6690ad

  • SHA256

    772566539dff1c9cd3621902bc7683220630048d005dc6f2fbccf4d6f84b95ec

  • SHA512

    5fb750ad9615982360d8f19a35ee314f7f64feb7156d9e2bf45b220262220ca3fcf79001a720edbf1f10fc802b76d8466944dd2d1e1715cee41aeda8f7069f76

  • SSDEEP

    6144:U9eWNRWQwdMMroyPgxbEqUb4jASgYBcB8RqdudoE7yAR24Wi:U9eW2QwdMM9Pg5EeJz

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1900-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections