General

  • Target

    580-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    e51f1ea77329605562817bf997f5bb2f

  • SHA1

    5b9593f571db76f47ad01533cbb34e7fdab2d506

  • SHA256

    2803f64b393040403195cef1f41f05b16d6781fab64d992937465081a82d857c

  • SHA512

    85affd4aa9c231c45c242c8463b6825b560f7f57ad71bcc9a798c7534319eb1c2b0e635ddc114176dbd206c7ab453aef31ae7df264c726208bfff563b449135d

  • SSDEEP

    6144:qx0uag30wPfAUexUe62tbtodkxEJMXYzG+txypYSj+kuVCXkpMr:qx0Dg3LXARXqkuwU

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 580-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections