General

  • Target

    1368-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    b76a7d2bde2f3d2d3d347bef8e6a9cc0

  • SHA1

    93b9916cf6483849a660019ddaad11e064557835

  • SHA256

    19ed5185dd5bef1172b7b90f0bf27555136579611d7cf2b9e6569edccde60450

  • SHA512

    06c039195b01c122bf45647d07228c8828e8f975cd104b1db8eedb8a9cdcabb02757b16a850881d53d7763b244291f876276102f4c51404618877c9cf507d9f6

  • SSDEEP

    6144:BFoWrM06EdxT1VjqT1qgxMUCRR01MdIxsHU/KiJtwwode:BFPM06EdxTb+ZXpQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1368-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections