General

  • Target

    1116-60-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    4e225fe877500fcaca10c0560ced201c

  • SHA1

    a483b8fe32f601334ac0395b290984d659050522

  • SHA256

    0c3e3e0c7b2270f601e14c3941c97fe70daea08f92b7a0302cd257811bebef25

  • SHA512

    33a19e020c778878de182d5d9801d030bef1ab585522722171c7173aa40632b8c61f88240ec0946b30e959310036528ec18911e7b0ff0a44fa72c71d132c50ca

  • SSDEEP

    3072:b9Ez2IHP50gUL8/CR3aGwE8Tw9rdB86AUazwnyo8Ywr0iKAj9YaNXYqWNVQ8hMeQ:bRI2RaE8AdabUhFrw1KoAqWXK+qtH

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family

Files

  • 1116-60-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections