General

  • Target

    1344-65-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    8dbb72d72460ce3c1ba1de55b5789c2b

  • SHA1

    56265607c4e92d8e69358e24915857e1a4662efe

  • SHA256

    b3887da4df9dedf2ac9b78caa2806a2ef36db1d7e81db3ad3c8f6bfa3e88daab

  • SHA512

    225e4191889804b4b757cb792e91e0eb48095485da19f5299545f645ff1da44cb4be57749932fb3cccf5630496481a99a4742d4d4f3691b1720c6e930a4a9620

  • SSDEEP

    3072:amQBCXBlYw4R2mlf7OahGUv5U5Ez+yY84mMMZK907RCdsf0PY9cpFU:af287pQUmig1mi90Csfnqp

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.nutiribio.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zGNVO(l5

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1344-65-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections