General

  • Target

    4888-140-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    ec10b694f19680aa5f4de149d9973904

  • SHA1

    8b44f01fce8c056d5006b90f94c872b26b74a674

  • SHA256

    f410663bbd90d6e00192162ee50ed31dece473a12964574170f983a467b26aad

  • SHA512

    62d75608963cec604432cb878e42d579e1c3598232aca5fca43f4456eb1093cc73453831b8c8847431458ece984f251842fedd704994d1b0746521a3610023c4

  • SSDEEP

    3072:LHTrJ4K8114YTGgvH5v3B15g4qmyOraPaNXQR9zncLyN:LHTrJ4K8JGgv13B1OVOhn

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6104239539:AAHzC3_HzjT7gB1m3Hf2pwV0zfNufdINl9g/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4888-140-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections