General

  • Target

    2124-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9ea98c4362db27257e57524a34f7e2c3

  • SHA1

    1c2b6d6ae4bb49cedfcb8e8554cc89b00d4cc7e0

  • SHA256

    499de2523c0751e830808ea5247a5567d9adf547e25d1af18176b09957ebe8da

  • SHA512

    816a9bda8a49c9f232e93f1f1f921313a5a6d90c7cf27879436e3f6fc64c762a02988e8f3c843099d3fd8fc45d87d09401270b89a71391f9c280b255a932f233

  • SSDEEP

    3072:stkyiHkwgpdypoz61XR9qpMfrWtibtCAuPjh/ogXHklIHbC:stkBCLypp/qp+zuPjJogUlM

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6020538814:AAGi6ggZTjZC0BhIaunk2td_4MY4oUZFF7Y/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2124-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections