General

  • Target

    524-63-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    779bb0d42e9a3fcad30b041d69722d4a

  • SHA1

    546498898ce56a3390423ff9bb38c748c4852e3a

  • SHA256

    1e133a81e1f720321cffe937cc9a14ddba87287eca7f1d86d36133830a20ad2c

  • SHA512

    3f6c0343b32ededfd0d0332f6533064feaa31d7b8e0dc836eaee94c60c0404259f5ff4c271dd90fb60d29b2c1e665e8cefb7f141656814d05d69fb8554ee783b

  • SSDEEP

    6144:fiDCBqgieUDmNJMbSP57ljCz9EtypbI6hPHKrwz5:KJgid/cMHZ5

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.chamakiotis.gr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fyr2q?93

Signatures

Files

  • 524-63-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections