General

  • Target

    1152-64-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    0fef53ad3d30b44e9e20e511a6ceb491

  • SHA1

    66c40aa8dc1a016e43e283ff445b459b9a708d88

  • SHA256

    2391d689372ff57e25e081e6c09e8f192e425207ef2df160b93b8d40041a4005

  • SHA512

    e3cc40d61b1983e0f8b14500a3900dbc7752dbe05faecde2e89ed0ebb5e36bc37cf8dee67565c2eed68372fd4086949a53abf3a49c88378b751149e4cd3741e1

  • SSDEEP

    6144:RHpfAoqESzUMW29mYOHfcFapJ4+QyCmJ21Ui:RHpfA1ZwQapJ4Xmkb

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.isis.travel
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Qo@124567

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1152-64-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections