General

  • Target

    4500-139-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    8a8f4613c518877c9a41f4217c9c4adb

  • SHA1

    f3890080b42077793e652e7d6b93b03026fea5a0

  • SHA256

    205d5bf036e809b14e99e4feffbbd862a0ea64dc874981206425cfedb7427274

  • SHA512

    b34dbf0b79dba48b97dda83c7ba02220394c9daff85cc7395f2284c4c8c476c345e2c470e82943c1c471aac97448e669320f8f14543f260eebfcf368f148da2e

  • SSDEEP

    3072:OUbqNqVCnCIWi1jn/VEcvRqQWniGbtAEqHRr3MeCrkZHdNcAoOjB:vbMnCD4DmcJqQb5HiyXHj

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1073351841217261789/NnPDWHoGskysnt_cVO37Yvso4HCKBMX4OJzJQ65V2g-M4gX029QlSHO_kclyL9PXI8Lw

Signatures

Files

  • 4500-139-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections