General

  • Target

    400-140-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a8a2e81d5cbd3ac17b5bb2caa1ea5dbf

  • SHA1

    01fadd62164096391c0090e5ea6e83b56953834c

  • SHA256

    1dda590ddc7fa68791f8f8ed19aa9b08b97d9e85ee674c37dc17588a5848b63d

  • SHA512

    21acdc5a53056ca07192a00dc717fa70cadbf3f71d36fab19bf6c9518b396bcd42df0177825e5c54619e623bf5f9d86e34e76003eeb54d2b9e074b63cdc56eff

  • SSDEEP

    3072:zRXJSqH8u1Sj94itlwfBXzieLsj8xaZ2MVl+k+gWL1K:zR5SSlA9bwZfYoZMVQk+gWL

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6266541527:AAGUIaxxki9JzGK-5gIHA-c2WFvuGVYdq4k/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400-140-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections