General

  • Target

    656-71-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9187365c1f5901771d315906a240165b

  • SHA1

    e12e0cb23f60e6f75ee77f6205eecea6e6e9b3a2

  • SHA256

    7f1d580806ae09e185a8b8af03ee90c69c847262caafcb1166d0ee5bb2ff0c7f

  • SHA512

    7706a8e4ec9702b948f4dc69eb0af072d7f27be98898f8c8f55301ac8d6529bc27412a21bc7b407c122feee9061142e396c6310857d00a7ab8cdd477c3521782

  • SSDEEP

    3072:FoIXP7yBr6Y4doTIIRSguyyMYaszIFhRhl30rRypXiy7iN85sV:TX+Br6Y4doUIRSgtQaszav/kuiC

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1109078597697802400/N0FrBeH_8MDeAwQC9ABA0W42QcoAZqnFM0qJOcVUO9LPKp2yMw5W1mobQTkR7BtIa2e8

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 656-71-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections