General

  • Target

    1568-66-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c0e5d461710042026d0524962e19fe3d

  • SHA1

    5c1f0d7a7baa1c3ec6888209b002ad838b642789

  • SHA256

    af74e0a0e9107102271692dded85c8f970a808143bfc0f5f82e9a7721f26a14c

  • SHA512

    101e8384f9ca06621bbb7bb2f1c778ffed2af28cc173fa43969e798de39f9ef79ce88109a06e17795dd50e54c4fed9cdc7defa228b0fc70ce30f3f9d99bb33d3

  • SSDEEP

    3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1:nCcFA+Mle74/HJDFC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.yurabeauty.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    computer@147

Signatures

Files

  • 1568-66-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections