General

  • Target

    4168-134-0x0000000000400000-0x0000000000438000-memory.dmp

  • Size

    224KB

  • MD5

    78ffc91b75c262eaf26d948f54f28918

  • SHA1

    8d7ba88dc74eb17d278bff5ee23a121caae8983d

  • SHA256

    6d2d93ed68778070d39140de1b31e2fd78ec2160f0989049a54d3e8a6b84a6e4

  • SHA512

    b6953fc3401c0ba1f395260ae65ef7ae6c2d3551db28393a64b797df5f29194b2cd988a51950480d2542a01d6eac89cb0b2e2fb03fa8b15fc4a3d3f7510f9144

  • SSDEEP

    3072:6Zzz72qt3JSrD7VcjNSU3RQW06fnwZ5SMBq7v1mX7fheLtFZoc7ZWLMB43oC5:kz6vnCpSUKFma5SMBq7NY2fZoEP63

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dms-est.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ab7865

Signatures

Files

  • 4168-134-0x0000000000400000-0x0000000000438000-memory.dmp
    .exe windows x86


    Headers

    Sections