General

  • Target

    5048-134-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    392e92d8ffb047628b30401e94ee47d3

  • SHA1

    fe59f58b5d44620fcd4fa5af811728ce794d7259

  • SHA256

    3b15c4b70c129e787422670b475613b15b70c73565445c7f7de89debaa7340f0

  • SHA512

    7dc3867530255aa9a72d2691555f9d0cd293689aa2a0ec698bfe2315cc23ac5f053300257a00c82f380e225e2a43e8de26d0a0a40a4457219d794f5f9d1e84b9

  • SSDEEP

    6144:PYuWW5dG0wuv7Z0GB18GqzrU2aqvyHuTuTOVCh0yU82iZSS/VX:PYuWW11oI/

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 5048-134-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections