General

  • Target

    2416-135-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    58922fc04066c85f6921a03f8df636bf

  • SHA1

    8b01d304c276fe778d2f24954e4157f756e6bb65

  • SHA256

    28c9311cf58a72d4f23a3abd698c33275a34ff3cbf104680c113dfb4e9d1c5ec

  • SHA512

    9ef7a2693b52071db8c8978596c6e037bf7ec6b8251f350c71f3fd10dcd6f626880bbbcd95619f4663b50964a4935d57c682d87b508ec5fb437b885a929dfaa7

  • SSDEEP

    6144:xhkj+lVhYSYR/CA5U+aOUddTCXy7eL2j4XsXYxVHfrBYJrYe:xhQ8VhYSYRli58rEr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 2416-135-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections