General

  • Target

    1104-64-0x0000000000400000-0x0000000000438000-memory.dmp

  • Size

    224KB

  • MD5

    fdbf06d62ef933580397204c8cf30ba8

  • SHA1

    a0aec0041a4c7b1517e97b165cfc07aa6efac10a

  • SHA256

    36a3c490032e56978108d12ce5d283221aff2306ee1de3553eaae4147bd374d6

  • SHA512

    18d2e3873a4437a78084347f9140b28616c70059e032ab35eab4b3ed327cfdce8dbafb11ff951cf611d7785bbcad91dbece39de5fd6996377b110b7ae652241e

  • SSDEEP

    3072:AZ+b6iCZKKgiLOL/w96G+mGFUtvxPy+mkPg5R8nP8bZNhYnnGIFkp:etZUwVcFU1xPmkPg5R8Uy7F

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail2.bpk-spb.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    75YWEv76M3

Signatures

Files

  • 1104-64-0x0000000000400000-0x0000000000438000-memory.dmp
    .exe windows x86


    Headers

    Sections