General

  • Target

    2820-11-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    f580033bac18d09c9b89851b8a6c08fb

  • SHA1

    a6f97af5f32f888c08105b91ae2081022dd45640

  • SHA256

    7161460f15ece043f47e149f2540e467d3dc5ebc08297fa040c456b63efa9e00

  • SHA512

    eb78dbfcb53d4ce7de4a6ce6e97d37c1bf24feb05ecca8e53dd1b9802b636b3b4a26fb796cf97dc96ec0724dd9991a61fcc5e8c536ad27b3a966d7dc0b50936c

  • SSDEEP

    3072:pGWHJanqIldjoJZAnUCfxvicV1Y4WWQeBYWE9cT2XikgBcwkB0iOTJtDymw:pcjIiUBa1CkS9yk5wEyvDy

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.hyshippingcn.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    e*u@qkS4

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2820-11-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections