General

  • Target

    3340-164-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    186329e295e47a0fe1b073d7b94a30a9

  • SHA1

    8b80bf494f0fb7bd976be0b2ad70f5da77a4bf8d

  • SHA256

    2a880a8998728928dba37b6b1fd4a12c926d75d4c63b5095d3f6483bfb09c317

  • SHA512

    6a4d63c20dba60b3ba793372a854c71bd2fe13f3446b243e1fab9fe1fbc1709a7e75fed4184dfa1787aa319bf0827451e2933f98433af22fe5893894af6c8ea9

  • SSDEEP

    3072:DTeSNvgITy+lmfhZ8g+bbHea0te+ETGCb/o3gmTjgk:DtY30ggreaFTyXg

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6050556352:AAE_-mublQ2CllMbT9xkQVBjSBbdvdYR1kM/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3340-164-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections