General

  • Target

    2020-63-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    d455c042277ae2cba52bb7bb9d7260c2

  • SHA1

    2b82015dd8565e67e175905ee7e4ff231087f903

  • SHA256

    2fff69791fd362bb51ba751d16007113111ad3679e7b205c4749d541955ea398

  • SHA512

    868b95d64ca9a35318a13e79e7a92abda9fcc4eebef4fb477356a3927bcd72b00f950f5183af08688566175667f0faf144c937873fb3dc73787b9b6fb8eb6bc7

  • SSDEEP

    3072:/wDfVbGGv4NnclURjbFLV80xAcIufhMtxfI2p1FZKVvX3M:/KoGgulURXxaefhMtxfIWd+v

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    N!hfzy$8

Signatures

Files

  • 2020-63-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections