General

  • Target

    3344-190-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    b534350b636de0210b13dc82b8d0b465

  • SHA1

    e18cc778830bdd51923a58a9d0af81714ae68b62

  • SHA256

    366e337eb4106c63bb0cd2bf5653a8a0eb5a6cf1d80e63465511455e84d4236d

  • SHA512

    889fa41e781514fa20d30ebb56b6de13e6e283f0b9d652ad8add0b98b6a6045f782b708e2af4361a9652de023b05fc5277e8f59c5babea8c1f27a5d360aa0047

  • SSDEEP

    3072:eG8UwxEino1e9xtcr8qSMa0baUKWN4IJEbJnaTuXq34XcogaVuT9pDQtWF9czy04:eRdnxlfZUrNJSdn3Xtb+HSI9sy0

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    KKK123456@@

Signatures

Files

  • 3344-190-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections