General

  • Target

    1312-71-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7e64c8a973a02ece577457ceed5f2c8b

  • SHA1

    8c11fc55e5a04b3fb60e0920329b634d37e236f1

  • SHA256

    3c78c9808ff1d575488cb39eab90ca3a421db4d6346aeefcf984f9e09c1d4877

  • SHA512

    82a594964b53f0c144aff614daa7f511917de9d0edfc1291f5be34b7f85f6eab9b2977db2959d61a02921b5536106c9b94dd5590f9daf6600c0330abdf04954e

  • SSDEEP

    3072:nCKf+SWaFA8NBI/TBF+HyOVFkNCznL3yNQTxlRC9RYOdh6oJB7yQ31e1Q:nCcFA+Mle74/HJDFC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.yurabeauty.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    computer@147

Signatures

Files

  • 1312-71-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections