General

  • Target

    1688-56-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    7fd07e22ee60f86fb461307004c9ab85

  • SHA1

    91e09940299b973bfbcfd07ae2fe3970a6cccb1c

  • SHA256

    1d5de4dd446039d7c34a94261333e33d70d9759c3fd5c7eedab00975fdad1d5c

  • SHA512

    a200738d0297e7d07c104dfa5d0c4ec4c4f832f6d03f299fabd189973a6440c1de5252cecf56dd7cbd0fd2bffeba7accbde01eae4f65743bb4f6c9286fe73f40

  • SSDEEP

    3072:IR/oEbRSM8amGmXNL30yL4AEMUL4umEYaRF1ahPcz8MUrKbA/F5I/RRKuOyGRfAa:OURF0qUcLEFjaPMPqH7opIGTIFsV

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    F$T3)1@zYr&V

Signatures

Files

  • 1688-56-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows x86


    Headers

    Sections