General

  • Target

    3544-139-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7277bc33df7cd09269c6324109aa925f

  • SHA1

    ccd2ab671b2426478cfb77484167efaae41faf23

  • SHA256

    5b111da79c104bba83c17c7a76d8601c3b5728b13a4d42b32c44ab153304cd09

  • SHA512

    6f38b313ea68df5069a689ec0270f5f2dda9baa2eafd3767f664fa46ce2ac364f4c57cca1c65d5b1c70805505ea1afacffb122a7426ec3687aa38dfc7ec8d635

  • SSDEEP

    3072:BBBoULT1fsU4RYcZX9ApwHnyRlrK7tKlQ+Lo7Sc+jbPs0b1qMe/woqz3:7BRLTBsU4RYcZNIkyRlW7IlT3bjTs0bL

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6014676296:AAHxuWZXqY8bUcQ2pv4pgUzoljef3z45sCM/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3544-139-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections