General

  • Target

    1224-64-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    fa9924dc6979a8ead4271684dc52936e

  • SHA1

    0f472b71d2983e985108ab5b7e49a73000a3d325

  • SHA256

    cf43687e020f0e44d0479a9b5a2d6842b8411b0821c997d7705fa3a8465d40c9

  • SHA512

    b362aa0c2db613c57d8a4ea6b2fff733d2002320a3bebb0c3a7691012560a1a0d4722d791fd19396a239e25588accfe3dcffe0baabc7638249b5a3ae3be084d0

  • SSDEEP

    6144:WOStbDzoX1060Be3K7rhgGuzNUEo0CXy7eL2j4XsvqbXfbKLBb2XF:WOStbDAGhcCCBbW

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5700681005:AAF2K-iQMsKRkqCcUgSZLmmugrKJcbb8Xg8/

Signatures

Files

  • 1224-64-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections