General

  • Target

    672-63-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    7d83077e177fadc96890b02b0c5a5701

  • SHA1

    90401d1a35a2753c2bbd84527fe38f82fc187044

  • SHA256

    72fc6bb0953a937bebf237fe625b485c31f22b498dc12590c03b4a1a841dc4b3

  • SHA512

    67ae19c8ac329e2bc205aa3012ed040a515c8370188077e574c72563b208230551c65a29c4bf38749bd69459378e65bf43e8061af370f38e8504a379b406409e

  • SSDEEP

    6144:Vs0UOFXUPgUVogeScxwVbvkZlAu+VmYTtHrvpba:O0zFEP23ScxwU+ZtrZa

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.silgroups.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    P@55W0RDs2022

Signatures

Files

  • 672-63-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections