General

  • Target

    604-68-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    e52c48387f877068941211ad95c17bc8

  • SHA1

    63eed4c4a04e05b1db77e921ce7c6e623c8d31c1

  • SHA256

    cd6c71daf99b2692999d1952f4f6880d863172e0e33417767e600caf88fcfc8f

  • SHA512

    621cc60d0af0abe25a37e5888cd77660a57446edd3bac4e7a9471aa50155d51b4c2284f2893777a8ce7cc7261cf84b0f8af52c9c1fd281e0729c41734ffd2c41

  • SSDEEP

    3072:HObc7X3kFXKSambUzo/udoXTDvbpV1WJ57u9CXKB9eO/0kn7CbmB:MO3kVKr0Uzo/ecL1Au9C6B9eO/0EGb

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.crownoffice.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    GRACEoverflow123@

Signatures

Files

  • 604-68-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections