General

  • Target

    1076-59-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    428c882b0283b2aa847cde2ee4901017

  • SHA1

    b72332a7922430bb2a330df4c6f2c0f3f053d27f

  • SHA256

    751a6be4dd4ec89f085fbbac73193dc398327e21d5b463c45514c3640c83a69f

  • SHA512

    305a370fc543f88fcc498d364aeba72c8fd3a60ace16b43f09c2e5040fce0661063114b74d16eb615738fc67b512c939ba5f479955d60f012c75a6cbde5fc448

  • SSDEEP

    3072:c0zIonlzyY/X3sm8uf7e73LV70UWl6Hc5+AQ9SEh/j2idAUvOidPoQYG:PzRBvxf7CGUWl6Hc5/QYE1ddBOsQQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.rigzonellc.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    rigz0n3llc@khan123

Signatures

Files

  • 1076-59-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections