General

  • Target

    1956-59-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    281a3962d8120dadb2f94aaab2e59c71

  • SHA1

    7d6f808cdb73cc4a4e471cf12664a0bf66757ec5

  • SHA256

    586b7bd8593237456e765d60460817bbd6fe0b25bed135076e0d01752457f85c

  • SHA512

    edff8810ef7f33cefb3cbd7417437c356e3956d6074b5f8a30441b5b673db4d1286be6e1746e16693689233c7d8022e49e0c207fda99d4a526158a8bf965e559

  • SSDEEP

    3072:R/2jAcLcXTRFgLf3D5Dea+A5C0QP//NM4eaFthinWeGAysvo:R/2jA8ccLdR9ZlasGXm

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6120421924:AAHfDg3lTzDUW4O1CSc9eyT6zf8UpaOZqyY/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1956-59-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections