General

  • Target

    4084-140-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    9031fcf1b1d06064c416e5e90bf2b427

  • SHA1

    fb95f4f4ab84bfe8eb3b85e016346d09b9868e42

  • SHA256

    d68df46f2fe4537aa0036228266d8d1e889d453daeac4e6623639b107abfd735

  • SHA512

    24bca870b669af99fdd3eb88c79d16d59e81e10399396a293ac0db64900c1ee4f5027476073aa14e5b1b13a36cc5cf45b599b6d806a36f8cfbf9ee3eeb497169

  • SSDEEP

    3072:b32D8C7vpeHHKZJRHp1HGiisHUsIpWOYbFnSBHaYEXJ4hQdnBQ9Mjof6r2/4GU:b+Xe0pMgUvsOlHaYezBQmkyry4G

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.biateknos.com
  • Port:
    587
  • Username:
    sutinah.sutinah@biateknos.com
  • Password:
    biateknossutinah
  • Email To:
    ericsales878@gmail.com

Signatures

Files

  • 4084-140-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections