General

  • Target

    1608-87-0x0000000000400000-0x0000000000448000-memory.dmp

  • Size

    288KB

  • MD5

    64f1c2769636ca44cf21753b9ae5abba

  • SHA1

    adc9496729d256e0da94d7e3004caf66519c4c77

  • SHA256

    137b80ddc475adf6307bb5545c3ffa7d39859182bfb265d7ca7e3ab054a78b66

  • SHA512

    46b75b165e4383f9b340ebf24450291dd4b3094f934350964b2ddd5411bd5e2801615a05278125a164f1dbda658766ced2b82617bb6c4f5a4804b96e608cb48c

  • SSDEEP

    3072:AYgAamSa//pSB8ukCRR7sPzB9T2dWvb95QFj+pNwt:AYg8SagBf6OADyynO

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1103875906361118810/4y7iINqCCd1vB_5CHVi8bfs-VsURmj2vh2ZdBw9vV7iC_QaLM-Uzs73INWoN8KSw28mH

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1608-87-0x0000000000400000-0x0000000000448000-memory.dmp
    .exe windows x86


    Headers

    Sections