General

  • Target

    1800-139-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    0337c402eec5378de791e996d75481c4

  • SHA1

    d2b4b6a70ea715d1ff9d15620a6e259037e03436

  • SHA256

    4c30c290ff27e5d7539e4a9ad157c2787fc8297f8c9f08606670566bd09bdfe7

  • SHA512

    4b56cfe0b86c27999760441ca9ce8af0d4ce218e30c089ca7cd1c7774f9e5f52c070196b492df8cabee945a83f88b050fea382526e7ee0bdc0ddf19ed49a1573

  • SSDEEP

    6144:UdO6XEhYaH/R4VSlNjhUSgioR01MdIxsHU/JajkiN7TlgZe:Ud1EhYaH+47j0CG7Tlg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

Files

  • 1800-139-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections