General

  • Target

    1864-63-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    4ac23bf4308502601e4c2cacf6989b9a

  • SHA1

    0b7adac94acf7422ccba0770ee8dcdb7614012f6

  • SHA256

    517b09b8880a12b53d272a57084231f85f2d6186ea2250078772780a0fa7eb10

  • SHA512

    2f668cae3ff9dc0d392dc3c65b026ef41dce4f5c0eab0bb3f1cef936d7170467b16f03512b49cc56b0afb71a22eb8710af11ae348845758ada7b080f7ab67b9f

  • SSDEEP

    3072:IixN9gTCFFKuoJ1mtodmQdAnjU+C31WJN6zvmegnJMUrIsJBGLfYquTqwVgJr:xjZ1SZiUPWTGv5gnXTagqXkg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    F$T3)1@zYr&V

Signatures

Files

  • 1864-63-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections