General

  • Target

    2432-153-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    dff760058f7d5f20902b7b3992b73a76

  • SHA1

    ed886ab0bc645988c803ef4d86bd6fd9cebc77a3

  • SHA256

    84ee71ff1da1c4275a14785eecbab0310e4b8f38253926e7f94f71bf21ad22a0

  • SHA512

    1525295d417fac74153b551f658fc4117284c648f024469763ff341ae319bbe430e7b8e4eab95c4aac4c33edabae86abc4541f1f5fe1216348a166d066913ef1

  • SSDEEP

    3072:OX/Ro0p9JF+De12n5PlebvIDu5DkVlbH8bXBrjREzDXk9:B0p9J+cSlEcDTVxuNEbk

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1098193000745672755/Wd6_n9CAMUpkgArKUcft1EqXvW3X0MTV136SSzy00JL4wVfT2dzL__3PN9ai9jnp03wC

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2432-153-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections