General

  • Target

    1544-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    3bfb42181e40a01e82da723c6237f4a4

  • SHA1

    ab4abefcbaf1011c44e298b4b8ad0e39876c4792

  • SHA256

    8bdb9d9f55277936b4e8e0160e7593440570774fc73a735ca42915f7a3a45bfa

  • SHA512

    80148c3460f6bc3be29303912d1ee9d344436799718f353e61a28d5c039d1eecfebe752c5b7b4762303c6890dbaab0cf36d2516f2d48c03cd23a9198c754b5cb

  • SSDEEP

    3072:8cS2mSziNuYNAOesDaHKleJvofBqUAAtFni+TB5/PScCWAXbDyy6jlNNayI:vS47MaHKUusUXtFni46cubDgl3a

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://mfaraday.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    B7UGGxM^Y)by

Signatures

Files

  • 1544-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections