General

  • Target

    1160-59-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    be1f2d4733181a841b0b9ee70df523a6

  • SHA1

    0a924f5d69d6086089a06d940d7977b8086ff8da

  • SHA256

    35ae51e66c59ecc3d81f2aebf878419711d7fada034d3a84b715790b4c4ba692

  • SHA512

    a08252fe4ac92146fafc59013b1ddcb75bbcb93bcb5c2d5e19d64ee50cf788518a52e93a405c00d66166333d2148683f2a00dddec85859dc336a16e619280705

  • SSDEEP

    3072:wdayV5pv7h1/tkOKCIzYzEOk5OKPJcI0ktkMXtz1EDrk6QGcmRAV:I5pDb1sCaek5AI93UJduV

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1082598970343305236/Wpl9RXuO_KYMIPjOB3KaQKem-Oq_QaZ3OhJgiC7UvEvJ_B230afWbPYGOxLc2PBI-Wer

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1160-59-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections