General

  • Target

    1008-63-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c0b8f85f89e5933c8bda62886f77448f

  • SHA1

    0b4ea98d8c60cee364d56d942445f2a3790eae39

  • SHA256

    74df446884a4012a6184c841540ff3b50d485a8e8fbd5475bd4c006e769b695a

  • SHA512

    74b3798145099aeb4e7d132d19eb85338253f6aec32dae1bf010b92deffabeaffabad0c1f9e9993a0e0dfc379a3e9a76eebd075cfe65926081456d2e565227ce

  • SSDEEP

    3072:RdGrU4oxccWngA4mLQZxZExnpcL1y3VP0Q:nsyEng/myYppcO

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1113012434450534432/EkGabNUQmF_N8jG5tHeb-Os4pmcE6fRqOQxuAsyiF5i-1TsUZ0cxwn_tzAtKIb8Ie_0F

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1008-63-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections