General

  • Target

    2036-67-0x0000000000780000-0x00000000007B0000-memory.dmp

  • Size

    192KB

  • MD5

    c0120677c4037f5c2b4fd148ac813414

  • SHA1

    332828bf40db13286463cec7877f3833b33e5cb5

  • SHA256

    646959adc710ee8b9c068ee77793ea6b7d0522428ddb2408a8325dbbf487df5a

  • SHA512

    613bd9b09e9fbd62e15c82803da38c66fe41dd9a71f69882cea12b3b7610bdea1ad45ea976d909f1b52d246622403d6237e45cfc9c12af9fcc7fe3390a5188d1

  • SSDEEP

    3072:tgXowImeif1K21WJJU4pMsixMSHqFvI9KR2ImTIUN9:t4K2sJ1p0MIqd1wVT7N

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.tecnowares.com
  • Port:
    587
  • Username:
    m.auletta@tecnowares.com
  • Password:
    pY$WNuY3@@wed
  • Email To:
    eretih@tecnowares.com

Signatures

Files

  • 2036-67-0x0000000000780000-0x00000000007B0000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections