General

  • Target

    4508-134-0x0000000000400000-0x0000000000434000-memory.dmp

  • Size

    208KB

  • MD5

    0929e728b302a2768eafec1043d71b75

  • SHA1

    3ae9ce578887f25736b8ea22380f8787b82b35fb

  • SHA256

    59e8eb84cc1df8f502e4ca3aa9ac20089b41305e68140bdeeff5d019481b1011

  • SHA512

    86dd2e6ec7ce8ff139308778fa2fb935fcebefe044c1b4bc10cab15a983eaa7a3abd13dbefe6e2ac65a02e756010befe1873652a59515ce754e828741bfffc7f

  • SSDEEP

    3072:0J7lbJBgLE+JaQv0OE3Vqi81Qp+0CZSc6BDzRz+Fqqp2+BgkD0E:QWhdsOE4rHJ611z2qj+B7

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antleds.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    NFlygu&0FA.Q

Signatures

Files

  • 4508-134-0x0000000000400000-0x0000000000434000-memory.dmp
    .exe windows x86


    Headers

    Sections