General

  • Target

    5088-134-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    dc065d0b6c3e3e3d5e2f768fd59df30e

  • SHA1

    eaad95fb7bd6c8295a35d6ad7b2967dd4529942e

  • SHA256

    4d44db93f8f4f4cbc07545672c375a85be9298dc0170e6a8d5c3a62dd5d51f4a

  • SHA512

    d9707920e1d3c8569174da723fcf19ac60480118bf1f1e53724c28af57f9bf1ba1f71ed2f1566993ca3b7e24841e680bf5c5b9b6ff9feb19da0537f697890fbf

  • SSDEEP

    6144:D1huKjNDKGE32U9Aiy1kV45mKmiGkELqM1H:D1huKjVE33vmEF

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.electrobist.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    w&oNc9e]pf~4

Signatures

Files

  • 5088-134-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections