General

  • Target

    268-66-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    bb67bb0f911751f24fe5a65024fb64df

  • SHA1

    c48b9b52370777b6971d4e9c4e614671b7b196cd

  • SHA256

    197a187ab432614e6baee849387db760d1519980899e1ed6df36b4c062772c65

  • SHA512

    a27dc589c1001ea4eeaaab5e09f90e17fcb7042a6816e88b8591be7c1d0c1388ec4792c33dbc58df3cbce50fe47f9e63b8c00c7c94bab2eb2147ba5cca0566db

  • SSDEEP

    6144:5bBF4q06EdxS6XK+G5U8+EJAp4lkhap6PD+r0hVEGcjWe:5bBH06EdxnlGNNj

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 268-66-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections