General

  • Target

    3512-134-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    72f3a7ffa236f1954ee9dcfd2714ab83

  • SHA1

    1d565d08087483b9831d2c9c63953eb270ab0626

  • SHA256

    8b4c89c1475ac69baaad56c92d5e72a149471886ff96e3de863a43230ebc9019

  • SHA512

    9251ac5e71d0cc2e0a264f528e4077ba89c63ac72e6a1459905951cf11842072dac17b7c3a1f997fa8646ef652e04b66a1d560dcb5be3183612efbecfef9bc58

  • SSDEEP

    3072:smQBMs2ppXY1DVOYmynUviuEY6Qd/dskekJ9Unp/AmwSAMOfYo4BlzYpmR:sn1JOXoUxs0ykEJAmwlYZcp

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.botswlogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    *(QSTCj8

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 3512-134-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections