General

  • Target

    1476-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b349d45a7faeae1faf1cfff263372d97

  • SHA1

    b535424dd7b37acc287de82a3ef512404d33b1b1

  • SHA256

    8cff74ffd25a8fe57ece2cc0dc3980d7e593d5f61bebdb236377ce2b8630d990

  • SHA512

    22b37f21c21240f49bd56001797e6d16eeae1ac4eed032692b2cb9e196672b2a47fcd7bec8638721813d29529a83a7c8ab977a8d64327644446181e58a3ddef9

  • SSDEEP

    3072:A9qjSPC0TbmVBsqjNYJiringZpyCrfrmxBguqiRK9x4kgjEi31Pa6:A9YSpTbaBsqjNYJirDZMXxBg8Ouk+1

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1107579601368129546/-EU13yIgoryb8wm8BqzLFQDKDKX50aSI1_K8Mqqm5meWXlgbyPOTUltA46zPKVXwNQsl

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections