General

  • Target

    3776-139-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    86b65b8ee065b72520b995e53d966b09

  • SHA1

    25e5cd2df8355b708f5f13aeeb167c1819fdf925

  • SHA256

    371e0c5f0cfb76b15e809838ec75c28d943eca8f4a83fa3bd2ca437b01b1067b

  • SHA512

    1a81bc6759dd8c781a610bddcce84f84f1e6a2af06640b0ffbb077d54cb2e69fcefed14ec77ce34f9447bc4b69885e9ac2f02f92098e1d7093da55529db93ece

  • SSDEEP

    3072:JHbkMN8o+cemNJEqIzYTX5uppj/vJZICJbyQIfcX:1AcfEqxCkCJeQIf

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://royal-arois.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ENugu@042

Signatures

Files

  • 3776-139-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections