General

  • Target

    464-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c883c9eaae9a4d8c4a9fae65e0016f36

  • SHA1

    99bd8f28d5f21d1cddce0fb1ef03f59dc8ba9dae

  • SHA256

    3a9b61aff797485ee09f4f6eabf07ad7ca377b77e8f9ad8e49d45511270f8593

  • SHA512

    d9f2e66f6a063a3a1ee5be82f3d85431fba411152e3f5d66947d57bd40eeb1e8686282a52d46eeed3eaf5c30ca98278f0c01ade23b499cfc5ad0aa6aa1a9429a

  • SSDEEP

    3072:0S6ChnbKNGB6CHhxyJeo0f/AFTjWWnb7Xvk8PhUnY:0bKbfZNj/OfnXfZcY

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1100717678320164867/nM2QwdzhSy6-IxL_NXdJUjJlegyAR8h9oAfAU7oaolJr_HjFNH8gmBkzUCsADzWd_M8Y

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 464-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections