General

  • Target

    2028-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c8363d70e5c6035a7379ec4233652577

  • SHA1

    5105a41893a3cb8899b10c33706ff58126ae51c1

  • SHA256

    48c538c7942ccc7cfa3eafccdc79d23630a667d0f914df8ad4ee4d745fc70ac9

  • SHA512

    07deb9128880368c5d0157cd14ed02250d99b71416f7c32abe6dbcfdc7cddb214436b0f8b4e5babdc5f5eecd7790686c9820a34cbe3d414c9c01a02f4edfe260

  • SSDEEP

    3072:8pRBQoXRk/DvyBoe9M1p497Jb9ZlfAl0mtEXT6Azu4MdAUR+hLt:wRBpBoYum1JbfKDAT6A2qBt

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5932003035:AAGiWu3EDh9FYzqRKIySebzjjQ5uW0afS3o/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections