General

  • Target

    772-60-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    d1282a7cd074bb88251498e996a656eb

  • SHA1

    cbbc8c17b57bba31593c8ec5cd6b4a1fc0475b6f

  • SHA256

    34531d0f48adc05fc05d7d3e1eeb92bf15aa0ee43a288251272e12069d868182

  • SHA512

    70b9d6cbd6d380a5d7bb70f4d0746a087730133caf68b0111d0e5fed3fba70fe49abb9b5d40440462fc7eafb259b137d5a5725297a7ce7d23d87bd45882c7382

  • SSDEEP

    6144:Baj69nSOUOL4ckGR1FJCGtWbheU/TEPpz:BaKnS8LG9GwbheTV

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.jadroagantbar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    IszS)Od4

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 772-60-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections