General

  • Target

    3940-136-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    17ada4e12aa2fb8e0b66b59b0bc5ef23

  • SHA1

    c1b1ebc27992c8a1f5e74c426bc0000d2dfbae59

  • SHA256

    fadf3fbfd2f1035e45c77170f65f21c56d873c502e8a2f8bb567eef986fea375

  • SHA512

    d06d9d8ca8571767b557c0c5495e6e82f620416fbc67e29095992478903f84e760778b20405dfad1d2ebd8bc52a18776ac9695797d26b78fa883471f1050b643

  • SSDEEP

    3072:3Kl2UZsFjFKhQ6DHaaPGpktvQ37sRm7zh7LJON9QwxLt:3Kl2UZsF9aHm3zh7LRw

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6030898751:AAGWK9mBSw-pypNHZ4QbexnTf4E27K5cZKU/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3940-136-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections