General

  • Target

    520-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9e4787008331c5ffa521cbadb44ebf01

  • SHA1

    c103537694bb75d200e0f0637510e8003fb3196a

  • SHA256

    ba94e14116928a119af03a7affdcba05d488f86b38b4b7404a7f9157a7a770f7

  • SHA512

    3d5b13b9deab0b9704205d3d6ca3cc6ef5234653fbc62e08ba7252d2dfa17ee28a53998a1b7c0c97ed23b86d6c3bacf1cc330cfb0021846633a8627d19488663

  • SSDEEP

    3072:J3aCmYcTJR1xhYzkkWWflGB+vh3DSp0fdahRSzOlF728:lcNrXc1W7B4kWCgzEx

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.svetigeorgije.co.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4c5H&b2whkD9

Signatures

Files

  • 520-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections