General

  • Target

    2016-70-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    84573ca1b6ee5c24fc7dbaa23224c988

  • SHA1

    261324ca92de138af02a0f29a1b9337c4a7caa3a

  • SHA256

    e1166186ce052aa6221eebddd3d2db6695969165aa3ec1ec3f9c49450f3dcc4d

  • SHA512

    7408c1bc39c046545148b79a52e6f6f09c0f739c883b6d37e7d03c935da31012668cd6d17bb00c5e3dff6869cdaaedbe98a5d206ee1ec24c5ad5272b7e145ba7

  • SSDEEP

    3072:X/5M2apLMQlvRAfvcupkLxkL3K/8peEEHidtpZ1Al:P5QjicupkVUKwREHifpZ1I

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.voqels.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    P@55W0RDs2023

Signatures

Files

  • 2016-70-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections