General

  • Target

    1916-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    6f7bceed5d2ffe1d33049fa9ace2db5e

  • SHA1

    2bac78150f9e494fd93c067b9700483fa2cd3f12

  • SHA256

    6746fb27490a4bc2e6109b0495d4aabc94e4273ac96bce12f64f0a9a4b2d0f1f

  • SHA512

    6338c1e4c12de60bac0fb56e564a3353a145ecc3f110d2452771009e2afa01dd2d0354778e5a6ead9332b7fd8d7f53d827d3877a4434bb18b6e261f6b03655be

  • SSDEEP

    3072:qlPJvuIihARhA5DbxQSemDl1x1Z5YqRgcwZxWSe1XCx:qlPJvuIif/Q6rtuZkSKX

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6041893220:AAF8CZzv8AFxOdWhmChH81__ao3x5_lnfqU/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections