General

  • Target

    1336-70-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b73c62f2271983d5d37080fc9a4cd70d

  • SHA1

    7c32b42abd2b398974098c6c66e46a6eb2c926e3

  • SHA256

    3b6f88c58b3c5bc66ab053bee099f9ae25bfc58eaf897ba3588c43f565e1e497

  • SHA512

    fb49222a757bc8eecf455ba7097f30ea9fc4a6c23f46e6d70bdd121ce715c6e108e301bbe8b4354ddf7dbed21d4cafb6bd9426bd65eeb1d1d18cd0289f69ef79

  • SSDEEP

    3072:XbrPlUdIB2nW9sX49a0sAmpInvOvZAfqkT+9J+wk:XbrPlUdIXeX49KuvOv+a2

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6164895911:AAED_HI1mzruTlBbpb3FC5MkrJlahV1OTWU/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1336-70-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections