General

  • Target

    580-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b9d536ff8bbde0013a2346e45c6bb49b

  • SHA1

    ff66b555e79fdc88a640bd2bb8fce70a23e0d7ba

  • SHA256

    13bf5ec8ace865381e2414f14458765fbef37f5f63b4af48610af780f8db4d8a

  • SHA512

    31dcd786b43b45ec93b5bfe8db8d3fb6ae124758c419ced223b9104cc4288848aa6a7d38371d5dba31d56e7e14dc9c0911f40bf2dd6b20052644493316cda87f

  • SSDEEP

    3072:xtVNwbI6K//pjL1YlJw+j6YJ7mH4YCqub0MyBGp:xOI6KnFOb93IH43qFsp

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6277498666:AAH4URlmeSysUKKZG20OTvrve55BRMLEu_o/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 580-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections