General

  • Target

    1940-70-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b98a07cc5186fce162e111cd1dd46794

  • SHA1

    006228492e87b868350387666933ccd83656cb41

  • SHA256

    65c97f203b8ae504addd9af6d70a188a2e8fb1b7498e130aa28bd831867f62a4

  • SHA512

    913ac03b08a4f8a6af5a421323f5b26b46b8222989fce1a12a55b177b4a2e9da2a95d33e3dbbb58a40839e057404f314e4dc86de2bc6b7ec5ae4a181119b49f1

  • SSDEEP

    3072:GsSP0SEU7KO4RLiZIdoLG0eF9AkElSSk6/RQtSxe6S/IA8j0:GsSkU7KrseWLS9mi6KtSxNeK0

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5705602282:AAFcwBeX9coGMKJeokPZOq06CS7N1H2rCJI/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1940-70-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections