General

  • Target

    2984-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    917dfa243b051f42045a9734acfe5ff9

  • SHA1

    0e6359463c6ce9d779338c71793e74195d2a1a17

  • SHA256

    64aa1aa8946538750aab0f12c393b8284d5bed3dbf2a61912b66635154a1eb1d

  • SHA512

    70acd6a7735837b7f9bac0217ac353707df834c6f7944b9fd23ebdd5bed856a6e4f8e29d99d9718b34f5fab1ff92b90c3ac6507bd8ca57fc11df629bc1c33e88

  • SSDEEP

    3072:xwdP0iyLdDneUMgunw19wEOJPr0pORaeYzq/2Mg71/+aL/U:udVyLdDneUMgunw19OJ7802Mgl5

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1123111679136387113/kqj1fFn4hm2kPAEkkqc4gRC0MBeh-KzuMOqThuwKpFmfsjg1qodF20wiTBi3KNx4DTul

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2984-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections