General

  • Target

    3492-140-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    9d4d37eea56809f54e34ab3568ebaf51

  • SHA1

    c4a689d9a7bc962c74d3cc8c3cea4ed561bda4d0

  • SHA256

    465e908a929fadedbd5149d57fca2b79732b0b4e69dd7828ba8ea0f9a3bd0950

  • SHA512

    d26d5cd7c5cd42eb0ef51221d885c5ac657a8736039e7bb87fe19bd828825be74f503f2637191dba4ec2842fbfeb2b44f495adf12e00979bb1354ea019b550fa

  • SSDEEP

    3072:ShID8s1p5amEzD6dcALnpvGDaoQUsGTlj8RPHJYmMc/WkUa8k2erA/Z3B:SWD8tmtLnsEUB5jSJYmH+kUa8kLrkZ3

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dana-world.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    communication$dongle&1132

Signatures

Files

  • 3492-140-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections