General

  • Target

    652-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    35e9b677c382213e2af224cbf85deb52

  • SHA1

    af228667adf7d5a6963cac830cb1e0216216b6f6

  • SHA256

    bc6e0eba180b85c6807d632e276d2fd6ae8c159d3e2748e78a357963a36cae7f

  • SHA512

    da50eb6b1dc6652865b8313fe53f3fdf80b435408a314d2d47ad3178c28473f9cc24e27e488e577800e5488ae11f21a36225a4f5c8a09d04505da0f31d16aa93

  • SSDEEP

    3072:iM1DTu/hnqU1Kz5XvO8gqMipR2wlOqp5IZaiLPuYz9zn35VRub:iM1ghqGW/vgPiueKPHznTkb

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6190932047:AAFAXC_q-J_1tPTmmiqndMdlZipgoGT2Ypo/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 652-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections