General

  • Target

    3664-138-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    2907910c0d96f9746e38dfa20b4a3b75

  • SHA1

    f4320c0d73ae9a77f568db3fd72e4f4bf18e84ae

  • SHA256

    a75c37648cf38550758803931389d1516f4f4cd9e7bacc2303ba6a407f80d2fe

  • SHA512

    242eca60eec415cba28f229751678f31feb290a8c2c9b5ddc845deddf10bd90cadecbb3db00ab9ea33b5aa3f7415d885d2dc539230eabbe898b697bfdc943b46

  • SSDEEP

    6144:kJACGmYshUKoLn6V/sHZUf1w/EJURkorJWy:qbYsdaZnEGeVy

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    *UC*BWj8OQWn3@@@21

Signatures

Files

  • 3664-138-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections