General

  • Target

    628-63-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    8d3ccf1caa69c62fa5869c4b4b31a636

  • SHA1

    861009110209ddbefb39047295f6ed17097604eb

  • SHA256

    60ecfc547b3fd7496c9909b7cbfb7a5f07cdd51b14eab2550121a353736565ff

  • SHA512

    07ef50e20bcf06600e8c3fb3a8f024e914fe19dbb0cc21de286282cfc6a224107b69f14f66f9743cc2948140557bf15bdaaeceb787b58a53fdff14ef3ddbd491

  • SSDEEP

    3072:uTFurnxUyoSfWw3tqe51wMmrKBcaprjEQy5e86FghCuEG:uTgxUyoUtqe0MmNayv5MFghCTG

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1071866246380933191/__47M-7dgo8Cnghn5K8I93FyPyTXw9PljFczBolz6tsLkTf4uXIJ6v5wLJapFgoCRq_2

Signatures

Files

  • 628-63-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections