General

  • Target

    1200-63-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    a96f83c0b03af20113a82257f50f4faf

  • SHA1

    bbff11e4c4c8034a5b3c4e95996b43f722056911

  • SHA256

    8c819759411a81772ea0ffcabe1c202cd7fb2e7063ec69b1dfebd9f06a379c80

  • SHA512

    46d982aa54b6725b60aff6b52002e3d18f426043871f81faf6798ccab6e0df98cdfa3b85864d64ded53c8be636817efad0412eb19afc9bd57ab4e926d5b59a6e

  • SSDEEP

    3072:/6I2LtrpN/ROZACPBsaKu18UKJAPBUpIUCvDQHAkCiZWQUYFrhz2u:/Ul/qmPUMAP6pW0P12mrt2u

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    godisgood3105

Signatures

Files

  • 1200-63-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections