General

  • Target

    332-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c1144abac571b4a399f1f24010431e63

  • SHA1

    724af951cd8f4a55d0a1154a23e161521d8bea3f

  • SHA256

    f1eed2d6051f1935c72a467082992c2e5e2761bae8100c2e049959a333f75319

  • SHA512

    a57382073264f7b76daefb4e6f839224fd1873fe9b98fad646bdbd33252e3a202658d3a76987cec2d903855371b4edc32c1e933f38a0ac06ac6a3a1fb6d5fc80

  • SSDEEP

    3072:og1J9mKS20Da61Qdrj21pNo52ucM5VC5SBh9qRg:og1mg0DQxjfRD5ls

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6205694016:AAFra52NaS7UwXdNdP3UoFHG1Y79jlGWBko/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 332-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections