General

  • Target

    4348-140-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d0e3b4d98b7b15e8b6b83afe2a357c95

  • SHA1

    efd6d9ab94099cb5efd9c6837d8646a9b37b22e0

  • SHA256

    233d276f0e0b19be567b57b7ad7155694a1aa3e88d8cf6eed74ef2e37ecb033c

  • SHA512

    1d0e13a802ee859ce9190b1a83b2781d8b58477d361b9408f5805fc26065919729eb576baefeae36fc1beab8d77fe2016481ec3434e3e77774ad1dfa0efd006a

  • SSDEEP

    3072:d7vXpUuAA58+YO7FAJfSLuuvRExAY6gFSDuEFQHDlbVugXB:d7vXpUuAWYO7FWDTxA8FSxFQHxU

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6048733251:AAHRY3bwFxY_dCpUKVaxkoIu25MIjLFtqRA/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4348-140-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections