General

  • Target

    784-63-0x0000000000400000-0x0000000000438000-memory.dmp

  • Size

    224KB

  • MD5

    5b8ec22a25c614e9345ee2423d602440

  • SHA1

    42bd6b76e48f33e52b8439b1616d0d604cfd7d9a

  • SHA256

    a1765e9f9be5527dae219898faf239b78269f70a4f613b13665766cffcee0ada

  • SHA512

    211395f11427bcd111edfd18a32601bf1fade067dc9170b0aa9a2b9e644d14e257e0f088f13ebfae77fafa6904b5dfb8c83ab2cbbb483911ed412ab85eda67f8

  • SSDEEP

    6144:s3Fo4tYPU1jPRhBy67QTIsgxhx2uBYdr:s3FbY9tOK

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eveningdresses.gr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    KypHjRNtZ[?4

Signatures

Files

  • 784-63-0x0000000000400000-0x0000000000438000-memory.dmp
    .exe windows x86


    Headers

    Sections