General

  • Target

    2124-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    915aae39d64f13e4da713eef984e2434

  • SHA1

    71677d6661a5e4a0ba915f6a328dbc011cd17a6c

  • SHA256

    1f75005d7112b780c723818f579ea2ba68dddde5ca249ad4ed3bfe601c61cd66

  • SHA512

    838fa127d5b61024f33a806f1687c6f2aba135116a2b24d18c28ad80f779a7d112c8de53b1da77650330c516097d43a0ddff266ba22b5e9eb1dc1f20e1a5cfec

  • SSDEEP

    3072:ye1SgFH5+NA2MedWAika6Mmw688bxh1G11En7zRoO5:ye1SgFH5+9MEWAO6FxHG/Kpo

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6398264133:AAElNl-q8CKRAgWjK-oOMMokpcoRfiVOGs0/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2124-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections