General

  • Target

    2412-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    47351e3560ef1ec52d1e60b6bce5c44e

  • SHA1

    3a48499fa71dcfff2e98306b214b2d34c6f191a8

  • SHA256

    d0b4c14e778d9c371118a3a0885ce1f3e6000954029192105e332e6b0d3a1843

  • SHA512

    9f732bb57f01a78dda73ebb3b318e2b85c3c2dd46ed139a3089947c9267fe194cff0edd3bc09c73f08a1bc7f344691efbbf91738da62c4c28934f1dff31a9ff3

  • SSDEEP

    3072:1qEPtY/wbc81Is5izxgDbKrfxyE9+/wCyToJR/m6KhSAyaB/5:MElY/wbc81Is5izxyKrfk/l/mPlNB

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1084897738958843984/yxXVxIViPDg7kf5HGR2i3KMIuvrSkqOXhOz45xzzJkay0UJIs_GVQuDipvA_avU7p9vG

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2412-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections