General

  • Target

    468-62-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    5afa2f6b10f9b7bff82269b53ec52f01

  • SHA1

    51c35c05667434bd247ec773a906cb22ec5621f6

  • SHA256

    6fc9c3dd4baad5389a1e04e76cc5415a01837dc666940d078aecdfc35f7eebd8

  • SHA512

    d26dc44f3c41a3626b74fb44f290f3b685abe2011ca7aa73975fa0897114a524e1ce162bca0eaa56971e91f02f124f45666d814a9718423c89c5e0bcdc1dea2e

  • SSDEEP

    3072:JGWG0eNp2aQSflIiGCAUsESSJAwYBu1lRHV+W6ylzYf74FFscitUC0:JdGfl0HUfJfYCBNcT4FLeUC

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.tkivna.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @2aweZ+x4+Ga

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 468-62-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections