General

  • Target

    1772-70-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    093f6e4bcc8c9984d8504a9c99a44716

  • SHA1

    f7cb67e78544fcc2516ab3e214bb90bd0ce8b1b8

  • SHA256

    a32e617dc635fdfd790900da13021e588ee33fda1c0f07efeb0a0ec5d4a69293

  • SHA512

    11456c3adc2cfb4bd332d18b3ba19a6612f5a16d346d77770653fbe1a1321b19ce4284e036d90702aa583cd02e482b6e90563a82e3658c28e55e9136c575569a

  • SSDEEP

    3072:x7v8S+C2FEaGZiwdjRk1VQw3WGyYmIEz05QWOr:x7kC+elKVryYmId5QN

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://files.000webhost.com
  • Port:
    21
  • Username:
    zincox
  • Password:
    computer@1010

Signatures

Files

  • 1772-70-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections