General

  • Target

    916-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    5e22c661a4f88eb232c4bbb911bd2a19

  • SHA1

    4d91bc8566e9b1cdde18627d4bdd7bf61db36e5e

  • SHA256

    55b3246caf07a20ac226872720d30a323b656371b51f9776ee6c5ee114409844

  • SHA512

    2c7c8353c07a184bd4fdc824a0e1fb62b9c2c055276e2b8be4110717bb252e0401e74da526e37670ed2cffc6e29eea1c83a3b63c93e45ab9efb078d74472a463

  • SSDEEP

    3072:gRkm8PoBnfcW04ZTc5hdDbT5aqvGBmQoBrzePUSUb6acyAgVV:lm8QBnkW04ZTc5hdD5aqvGtIzeyxA

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1105881039911534693/dLNv0NzBF-zb_xIoSptqZ4HWjpGEbwpw-iv_RW0S-G20qwXmbtLrfVJrhYfVOXrx51pi

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 916-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections