General

  • Target

    1468-32-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    fc439f080a94d1174f67e090bf8266c7

  • SHA1

    84a1df8330503f1d8fe2364284cb8ceb7df69df8

  • SHA256

    35d336bd835fdbd71248dc534da5a37040627b17346f5a83f70834c108bd266e

  • SHA512

    633deeb540285d3b09f96e9396ac393de731fdd8e4a546e78e84b20b803f9254fe340ad45385ed52adeca9f63ccb3d68826671c59d5a6fa56352ad83677b5b40

  • SSDEEP

    3072:F9iiqY2SmTxxErFa6b/HGr8H4DEKSM5s:ncNTxxErrb/g8HNKZ

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    obilogs@hulkeng.xyz
  • Password:
    7213575aceACE@
  • Email To:
    obilogs@hulkeng.xyz

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1468-32-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections