General

  • Target

    668-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    14fadee97e016885b940432aeea6d4a8

  • SHA1

    979e1a76e126aa83de9fff41a3b73cb1a594b34d

  • SHA256

    ed3e080a18d91b9fb1e2b4bb8ad00e331afcc92614ad200e7c4a1b6bc9dd260c

  • SHA512

    c2dc4db946a9c75619db9e6b6f4e89e484c023e9c98846cbf9c3cf572f43ce2ead357f0ace77ed72d132506fdf6a331e1745e51d7b8a0e622e1940871b5d3853

  • SSDEEP

    3072:VCBO4N3ZSqgizCIMa6xy01UVrI4Nvyi3R5JvvtJIkUk:VCBO4N3Z3mIMzx4NVTIk

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6048511556:AAHOMuyPqD3_SVp96R8Ep5hv-a30DV0-oqc/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 668-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections