General

  • Target

    1772-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    067339f405c5114bc331a35ee6e48486

  • SHA1

    ab059d7fdfd1d1237a241fd28480957127647ee1

  • SHA256

    de3784c9b5cee91f8804fde86c15085a0d4d5cceea8edb20772582ebbe4e6b83

  • SHA512

    ca704faac375cddf2ee2aaa835b7d8c19ce274fb140d1f31fd8cf7ca0f3fd84510398a43f21bdfa734a6f163ea4a766f9fc3ce61e7d5d5be105dc2dfdb7cc231

  • SSDEEP

    3072:w2RSEl7Bi80+mkq1z/Fovjjvs0HpSZBLXcGo9lWZJx40o:w2RSEl7BiymJ1zav8kcLLklWe

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6254200827:AAE72ehike93Yl10K-g-eoD9WA3Xk9taVes/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1772-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections