General

  • Target

    364-67-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    a4b665ee28fd2a0a48dce7abc8cdd5c0

  • SHA1

    c41d51a2ef280fc8ec62ad5314f707bc81dfd20e

  • SHA256

    59afbe73c195a99cf7a64d239aef840ca935260c36ba1840546a93e1cefe5824

  • SHA512

    bebf2d5770cdeea04a5ee69bad2028b8c8bb49f6a3c438c4b5e85665860cba5e279a0acea182715c88f477b8a03a47dd8555287b37d1fc75b8c70ef34b09c4cd

  • SSDEEP

    3072:TENKVKf4fzV2LQNtUg87Ct70mgOI3AsqXIAJaUG3uTvK1ql:TE4rzVKQnUgRt9I3sXIAJaUG+TS1

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5547723454:AAHqewaHCTcN2ZyoJn_xzOGn7Rzrt3kXyY8/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 364-67-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections