General

  • Target

    1960-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d9fb396b02c364d2c663c46e0d645c37

  • SHA1

    483f900fe45ff895239aa36998dd9bb5c30a6707

  • SHA256

    ef41134b99a4bd6d857ec027f336d33e8c17ca600da4f340e23fa7f30ebcc869

  • SHA512

    d5fb916385c47de26aaff19048ea8ef21afb4c4718b66f5486cd6cdddd520dbcab736a08815e37ba0662e089aa0763cb7599004c59ecc8a9224462f6396902bf

  • SSDEEP

    3072:2RMo1oEM4y5AML1mu0NOpRZ9aNBVr7i8JFYTT4HO3hXZDM1:2Z1g5VBBSQRYiuYUC99M

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1070226854310596669/RwLhTOI22WaSt_cQ7HjFY4m4PLLy-bxZ-cBOre0eQiKspGukafp6YnjW7FOtwbCnyaDO

Signatures

Files

  • 1960-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections