General

  • Target

    556-66-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b7a3003ebe25faf976d7b202438783a9

  • SHA1

    e38ba5adaaceefc164683c9a9a1649bc6695efef

  • SHA256

    18ecb32c81a0ada0c5b6b0b0d8ea6cd2d0184b9d4cf093f928e976546abc94fa

  • SHA512

    c6d9fc0bf879a4e8602c43608c29fe145c59aa208fd7877bb63ed14c68d470890b0a9301e9226d2fba70ed9fec335f0ca1feff214d65422ceb93911b9b6a8f69

  • SSDEEP

    3072:ye3DuY/HkGHCzi3r6OE0F99u73vTrMvH3R45jPvCyMJtDg:FdHkGp+rg99SDRXK/D

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5814058627:AAFjPgERfyp3AZJXAfISMezajcw2VR_A_9U/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 556-66-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections