General

  • Target

    1460-70-0x0000000000400000-0x000000000044C000-memory.dmp

  • Size

    304KB

  • MD5

    49714c427a1e06032b44b571dad3fca9

  • SHA1

    ed9e59790e903921b6deda49a3e5b32f712b983d

  • SHA256

    f56167428700d241783d1d822c1887b33895d80e4bf6e9b95e5d75bf1d1ecb2f

  • SHA512

    60dedc545170e34fa004350be0664885bea1bd9e2d26e2237f210e15ae5177031064c7f3677149bb4a3d82b5d6843094bad000450ee90a12b935a4c1a2848965

  • SSDEEP

    6144:829cGVC1QkKnGnV1WPBCMW76Mbo9rxE4LXyB2rbq:P/Vp2V1au7ixE4L

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Tobenna1993

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1460-70-0x0000000000400000-0x000000000044C000-memory.dmp
    .exe windows x86


    Headers

    Sections