General

  • Target

    1208-65-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    27e6eb1e16a65229c2d4e644d64722ed

  • SHA1

    e4a1443d1cc40e93dfee656a5cdac3f8fc219e42

  • SHA256

    3d51791e690791019ec6bcb8f046662feca6e3158d702b67e35d0216b56bcb0f

  • SHA512

    09f2cd1c39d469dfc72caeb6a9409f702b6ffcf47746b103eb00e8a6b53a765b5a1a4c290f8b7c58f447f8a307c3b543bc5caf289b57164b6e5ce58dc103cd0f

  • SSDEEP

    3072:K0PQGrmOEqQMDkou2z1WcTbxqn1c0BLdD/xJ2jMW:VPQGkM6EbR0BLBxX

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6295925988:AAGRAB2KEQ7a33uKsLEb-_YBRM0c6GJ3Muo/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1208-65-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections