General

  • Target

    1748-163-0x0000000000400000-0x000000000062B000-memory.dmp

  • Size

    2.2MB

  • MD5

    59fb438f3964358971df2f35db072a70

  • SHA1

    9cbc431d8166c7eb33243f420649dd1eeb924144

  • SHA256

    68474bce4e3836c45b34e582da4cac022e37480c8ab31c1421803254c7cbeff8

  • SHA512

    820f7ece34f6ce23a3df4a770f12e0ce008cb6a38c9457d37873e8703537d923fd05adea500180d151e499e7e9d8c4ac06f6b8b2802a982d091e7e172803ec5c

  • SSDEEP

    3072:Cfo+aqTpEb+cxt1nOfQX4NV4f5k6/yhPrlkwESCNim0/H:CNpliPOooNVL6KhTQhQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.mcmprint.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    l9Hh{#_(0shZ

Signatures

Files

  • 1748-163-0x0000000000400000-0x000000000062B000-memory.dmp
    .exe windows x86


    Headers

    Sections