General

  • Target

    1708-67-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    760aee78bd601966e4fafce950f45e95

  • SHA1

    6dcf68ce97717ba141355fb1b464fdd975b22597

  • SHA256

    ad6d571b2bcbbf50fdf574041dc6d041481df603803558c9bd68448e0114504e

  • SHA512

    e989f657ff792d4856ec877038ecb015f765ee93eb5d9d3f6601070ec8ebbd0f91cde062f807b9fb0cadcb99c434562fcf0f2a910666158d1094f4a33022dc57

  • SSDEEP

    3072:2OoTzEBAk/QGqN5yXZcoiw4/h4XghJGUferW3kZF1ahPczPMUrVVG26wA/Cr:nos1pcL1iUmaMaPMNVGnwkCr

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    F$T3)1@zYr&V

Signatures

Files

  • 1708-67-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections