General

  • Target

    1936-194-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    c05368b66efe5966e18fa4e0b35fc144

  • SHA1

    e08539b61a2b5ec0d048c97dd9eddca4d812823d

  • SHA256

    04e943c2230fc2fb7eb65303d112e415fc4f1fb60283c0a8d3046fc7fb1fa0ac

  • SHA512

    29833d65608034ebcb0ac648d7cc68289a30e0e7a2cd32fcff5a04bdced471d731fd67eff66ec3cc6e500dd864132fa6c99ba098dd38ceb5bd813854b6e334b8

  • SSDEEP

    3072:Tq2Iim2LcEAuOxoOIozLvrTkBCxRUUw/6pdQOU6xXS+SUaWzyQi2I/Lmg4CltLks:O2FGtBzLvrTDoUw/6pnCJyyxNqIltoa

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.instantprint.ro/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Playmen123#@

Signatures

Files

  • 1936-194-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections