General

  • Target

    1768-64-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    7b263e743aca55e5135cb5b0172fdede

  • SHA1

    31ad091138450787621fc81f75cbe2a7b56016c5

  • SHA256

    c5de636e581423e66efde5cdb8fc2742eb6e87057ffa44494956af86ebcacbf8

  • SHA512

    fba99cab8d2cbd97e9a46faad8483a905bcb9f0fe5bcd81d758854911582954cfc737c9606e64a3fba1505be3f1b54115d9812c2d5a434352d75d1349b62b153

  • SSDEEP

    6144:4kAgLbFES2+MAE9UWqUu0PICXy7eL2j4Xsgd2mFhk5fMSx3qe:4kXbFES2+keWPBhop

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.maybk2u.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    dnp@2111

Signatures

Files

  • 1768-64-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections