General

  • Target

    1644-72-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    bd3534e0aa3ddac2efe8b3b9a388f2f8

  • SHA1

    31d67408830edd29e3a6029a11f749056a271895

  • SHA256

    97a37f66cfdcad811b3f6d198ce778cb405a6c9d679f3f5154f48cff883e8a2e

  • SHA512

    003359cab0eeffbf0251e24d19b6e747df5a29026c24d5d4e8dd58213316762d8ef722fcf8c1f63f4800a2d24ed5c4c430c05cfe0cc7e37d304d4aa2d079fc20

  • SSDEEP

    3072:9mQ952ZL7zY3suDu7xlqUvoABLvCLYRIOeFH1EPsz0E7hbPps4ePLhrnjYbZW:9Zs0uVoUBh16FLz0E7hu4exsb

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.valtronics-ae.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    YTMIlIR0

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1644-72-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections