General

  • Target

    2040-63-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    b2e9fe835186ae7c330e6082d432d777

  • SHA1

    1e123df8a79001b5837c080355c93e4e8c7fbd53

  • SHA256

    d64afcf4ae04011f4aec80bb6c05e85362230aeee19c9234ca9ac580531ef375

  • SHA512

    145a5d74b597b14f210d49d248dd0895f539b56a8ff684d98f16de35818021b2d83df88def87b33eb02ef68cb09f12d4b3ca57caa7c66a9afaa525952d97d1d4

  • SSDEEP

    3072:900IcWAtXVZ+6kq0mtHR2iX/LVZvqU41Jvy5IMKWpSkXHyGrbpOvQF8:y05VwgTR26SU41JvyPKW88SGrFSQ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ikechukwu12@

Signatures

Files

  • 2040-63-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections