General

  • Target

    1728-199-0x0000000000280000-0x00000000007EA000-memory.dmp

  • Size

    5.4MB

  • MD5

    3c6ed594a43c564cf02ec997e4c735ba

  • SHA1

    8ddc1cafc2c57f77ec0e56b2b1b276898a93f6d8

  • SHA256

    4b1c5dd642125eb09850fe71226d0a391126886833b2ac0a6c394b5f3be5f14c

  • SHA512

    ff0aca25e66c389b4cd9c9777ac74da31d46a17c214198030b870f07166b9eec761db79f1c3120fe3682f7db20c483324d8332682db64627ebac0292c95e537c

  • SSDEEP

    3072:gKag7yzEszK14l+/30Dkk/92HkdWV4u43855lGbLaY4:TNss4ljv/O0WV4938XlGna

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6227397160:AAFNPicz3HSHnEavbP_JK3Chv6W03kNGGmw/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-199-0x0000000000280000-0x00000000007EA000-memory.dmp
    .exe windows x86


    Headers

    Sections