General

  • Target

    3548-220-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    aec30139c97c2d25810475b148af7c12

  • SHA1

    b728d935d01339006caaad65297e7c0393f776e6

  • SHA256

    8101a978df114370a8dd753e5b9760d83e61ddba39d0dc2f557177349abf8ea6

  • SHA512

    2cc023b08eefacaeff73dcc0a6f04c8fc686dd9c8fa1c9993baee9ffaca83f7c4fd50b885840ab2ec58502f4b8a9dccb4bde2c466201d46bfe8aa947135e69bd

  • SSDEEP

    6144:J0OSoAwoYgw8a/UzlQM8JMH5LWYcpXHvU:J0OXGlh8OH5ns

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1841252439:AAFeBNk12wAgfxXFXtqpw50JT4iCgTc-FsM/sendDocument

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 3548-220-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections