General

  • Target

    1940-56-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    40c40690b882a6b74872460cd30f33e9

  • SHA1

    d477ad8046189ce323caad30dd51d39e738109a8

  • SHA256

    1d104abb327483acc6e2bcffaf52518c98cf84d0ec987b42b82b2f31c5daf761

  • SHA512

    edf2d6b3d5b65973d839b255b55bdb7d82167dcd09273e19d855e7850d7dd68dd87850a28dd8f1fcfa6f6dadf1dac09e4b528a024d5ab3c5fc2d047ef18259ab

  • SSDEEP

    3072:YQBsmfGb7qrgb4RnZTh2LVGuR89kiNl5gLrkumipwE9Y:YQBsmfGb6RnZSwLjN05pw

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6186587654:AAGCfYz_-Ywr0jS403I82r-XCvl_CsLT1L0/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1940-56-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections