General

  • Target

    1832-62-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    2c289a1c37f33a3853ea8be86119a8d2

  • SHA1

    f707ad0f2c4e3e3e5dc8acb7b0999ec88eee4def

  • SHA256

    7f29afe9e29a521c8b7fb4260704968de548ec54f24467967e23179d465631d9

  • SHA512

    6b7118dfc7977c7696ee0c6ae6477eee2b0c5a708779db6b4f6848e5a0825b6242c4942caee6e924e03f9e0f5c929ebb3a00f33ed4dc5e8450ee3a23d9e4324b

  • SSDEEP

    6144:0lvPSCiP3SQ3hc7n5s2lBCrYWNXMbpHLjwb:0chPknT

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    srv31.niagahoster.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    123572525finance

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1832-62-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections