General

  • Target

    992-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    937ab8dfca8ee09cb48cb717683ce60f

  • SHA1

    932b97fc81603e63e90b506ff7fcf2da5e160332

  • SHA256

    af24f047c0bafff17f446075a499df175d30ea5c96442ee4bdeaea93cea477e8

  • SHA512

    004db1837de8833abb2a8fe24536acec386e8cc964ea1758667217005cd736b687621e7c157ffcfaedf7b07f0fccefa72ba2f536ee7a073fa974cf3c9f280176

  • SSDEEP

    3072:Qg1j635AF6rPv1xeoGYr2drgQXcTpk6GM9vfU:Qg1itpxbGYOEQt4

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5868174658:AAHJslM63unQc1JNkwJs4OwvvEIysDbvCpY/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 992-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections