General

  • Target

    1564-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3e0e61a23045c08f30061c9343f7f872

  • SHA1

    ab6f26a9052b7f7badc8b359891b7f1cbb122f61

  • SHA256

    0b0daf7f5c06a94b00642f9104717fee7e20210a71c75bf92ad96e62c393d3bd

  • SHA512

    51e146c585ceec0db3578a608d984b4d515195d56074e1fa6789b9ce461c5b49f2efa463dad4d5087f672228e0b13840745e238b4653a496585b0e24a2551399

  • SSDEEP

    3072:f8mUVPOC3NBiIwujw9WaOAEYYoZlQEUX3kNPCzi6Q9G40+bm:tUV2C33iIwujw9WaOMYcmHQi+

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1123335248499965962/k2XuCYWBkyR9TKAGVpy_8KTe1UER7xcpugsKsQbLE2FQB9RKPyqtgnsdpV7Wdxyc9FXu

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1564-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections