General

  • Target

    600-68-0x0000000000380000-0x000000000085B000-memory.dmp

  • Size

    4.9MB

  • MD5

    1cc9cc99253e500b73cdc326a22c1108

  • SHA1

    cfe3f90999f87cc84bdc7edd594d8a1f86f37116

  • SHA256

    7fafd0855220430871721b894991ad5567a13c6011387a09b9499ce73c482a54

  • SHA512

    b2726e7f7ee0ae828756461cbe6ef36b2e3106cd7f312a030933d370832e1ffc1e8ce80a9a029b8dab400c6bbc161c28fe906cd278c8c63e6fc3a24ff6d61942

  • SSDEEP

    6144:WTrwjmbFES26Qnkc1UUUIGlzR01MdIxsHU/YqQyap5Dd6pKe:WTqmbFES2hkQUXlzbD+

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://superredesdeprotecao.com.br
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    GRACEoverflow123@

Signatures

Files

  • 600-68-0x0000000000380000-0x000000000085B000-memory.dmp
    .exe windows x86


    Headers

    Sections