General

  • Target

    1936-76-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d644dc114701292cf4d72eb682d42789

  • SHA1

    9851d9fb52e1185f3cea9cc74ed215aebc30325d

  • SHA256

    bf1646175bab418858ab01f48d5dc34c9b91dd5a90db6d033ba93ea76e57aa74

  • SHA512

    8d03b83707b46464d07d9238a4bad5731dff224b67758be69e93748852c5268bfcd99155080cb431594c925264bbcbd608ccf624b11e0fd3bc1c23a101c0b7fc

  • SSDEEP

    3072:/P8T71LCZGfCv1dvs/DmyMaXV/AJO9rUeOzScLbKG:jZGfc5WMal/P9rUe3cLm

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6225839139:AAHOVxUdRr3_xezeR4e_GlriGQEKuUFBpW0/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1936-76-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections