General

  • Target

    2016-65-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    cdd28c3c20721b2e14af59bdbbea5ea4

  • SHA1

    a8850231513d8360b6b96d89c4a96e6b96d945cd

  • SHA256

    55b12db7eb83c360a017cb5ae07f36bc14596ff73f82a1b58d9aa1daa8e14ff8

  • SHA512

    48f216c8062e41dd7a70b0796ecd72250031418438e0b729b4892ac76263c24d861d640f9876dc6210d0b1abbcf3204ebecf0a7fb8f6ca36e11ea55fd548075c

  • SSDEEP

    3072:t0kmV4h6CPs/gBuUA5TJlHOr9PZoJzzKzVhoLNMqk1Hd7b3Mv:tNoCPklUAla9mJzzKzVhoZM1197

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @ossai1111

Signatures

Files

  • 2016-65-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections