General

  • Target

    1356-59-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    2371cb85b2662387022d7707ae866c5b

  • SHA1

    40a1e4429bca1b59db38828feb6c1e7309a407de

  • SHA256

    f04437b34ba3ff3c18e4215d02c9e60fd24ed8af152f2d344c32351ab4469343

  • SHA512

    ffbb50105e60535fc3180509744deaca27b2d0fc50680e07ed0a8857e82db127d46aeb11e8eb18af553da61588d12510a8d4d9b55d0a740e95b2927fa51a8852

  • SSDEEP

    3072:uYQ7aqepkGcCU6NcQWVILnVrbEQXgf0s2ZpNBXvnJgBXlwC+DTZ83JDAmuZJzXgc:utuVNi2Hvnag6AmkdXg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://195.58.39.94
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    product-secured##

Signatures

Files

  • 1356-59-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections