General

  • Target

    2040-135-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3cf11fc38968675eda551bab42be40fc

  • SHA1

    eec9b99df3e7ae42791eb999212171697f332aad

  • SHA256

    0d307a5482a78f14d4e21934df5b9350dc062f69ddf029a6ebb8e1a4871c4798

  • SHA512

    658b94d7d556d932aa14810a9aa9a91b6cadffabb96c751e1d884341b38291a2325327932d504bb351570e881f2536bb69a390e75ada83a32947ef8d87acf4f5

  • SSDEEP

    3072:3vpQU+feaYpCK152VWphP1rVT/kD3VkhzkxrlrsgJcWSB3R:fpaYwQ0e51JZzk7F1W3

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1096090521576939691/Gt9pzmuIIMZ8BVxK1Z2ZpFdAqFcM8OiaPxuWv8OUozbquQiwW3yWY2UgqiJMCpT3N1SN

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-135-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections