General

  • Target

    948-64-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    e486efc411e173c592a13fc028355056

  • SHA1

    778222d65c06450e5e2de022e1b30b2c9e96ac12

  • SHA256

    d6459b87642cd8c33bbaf242fa16835506389d8badcff6de3d6feed23d9f051c

  • SHA512

    95327bd39b787576a78479350a8451dfc10682838e0e494d686ed813bdaf3193f2abe9a71d5e045d1a67a67b3acccc1d09b1655c1930fa8e9944d48b67bb9825

  • SSDEEP

    6144:xzJaZkB30kh4aHUoZUK3UvUtMA10N85AdmVuD+gyGhi9jiIS6X:xzJaZMUBh4ZS

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 948-64-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections