General

  • Target

    1344-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    484739e5ba19b60f03489a22e1261a6e

  • SHA1

    522eb318b1b52026208ae7df69bde832036aca45

  • SHA256

    b9174089c780095aa5b777ff2ec9ffffc181a77ac89210ba9265e7a591bca046

  • SHA512

    0ad7894d5cb54db72ad89ec55fe00c9d932e8778faeb953bae2404c5c30ebe2eeb49c74736cb1b3a4944e410b71356a8e028a7567c6c5e171475f1988ae738d5

  • SSDEEP

    3072:gRkm8PoBnfcW04ZTc5hdDbT5aqvGBmQoBrzePUSUb6acyAgV:lm8QBnkW04ZTc5hdD5aqvGtIzeyxA

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1105881039911534693/dLNv0NzBF-zb_xIoSptqZ4HWjpGEbwpw-iv_RW0S-G20qwXmbtLrfVJrhYfVOXrx51pi

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1344-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections