General

  • Target

    3052-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    10dd5c5f0a2b16f8428b8712768f156a

  • SHA1

    47ab24e0ab0e7c8f5cc7ae86554ffa8833fa0e29

  • SHA256

    590a9bc56051ed3ce78e4b7510bfac66f24c804a438941a359011785fc662a5c

  • SHA512

    86cef9505774be5a6f1c12970ebe00b647ca9595cc0f9ec21acc3c49a9da685e1d40886a57483bc8d7b7f828c6222535a55128174a9f19a0e95b96637c5ea66e

  • SSDEEP

    3072:Ad28umhBf0m41V2R/AkRxsADLFU8yQUA1W4Eo57rG:AdZfKoikDXtU41P5/

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1128203134972469318/QtFT1t0oNks6xurMZS1ezgQCTOfMUrnmj49_x_s8ClCkPFxGvr4hkMeGSfktYBVRfeL0

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections