General

  • Target

    784-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    47bad92f7912534253f5c565037fc4a3

  • SHA1

    0e17513bc9d74cf53e94384f7d64f8799522027c

  • SHA256

    d69a287d62fc691ae0b744835902c8dd7a55fbf5ae9a0c9c740d3065b95baafb

  • SHA512

    a2b5f4d7b317460ae8489601ed1dd32d7c5ca96723d93c9e66d55444a76627d6844603121a22da3c9b17ba3dd973b94b9c4cf2711200b0a2893931caf10f4d70

  • SSDEEP

    3072:Qt/pzuLaM9KZyWZCIbh2/QZQADy+e36I42nhiImiHDKEl:Qt/pzuLaUNbuhtxO6W5DK

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6237173637:AAHL1SZ0swNAdHMB508Hs_WnK-RKakXlUmA/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 784-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections