General

  • Target

    2272-58-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    16195fe3543960c7bcd9300d87411358

  • SHA1

    00dd82824d31cf486faece963705e0397875460d

  • SHA256

    321c22d4bf4dda8c3235ca0f7cb0d5a9207ba3b0b5f18c810da90ee877138973

  • SHA512

    178ef8fdd216884dc4f6a783829acab61cce6aa3f3838c07b587cbee7e939e2f062c7b6a8f98141450da3db481eefd02c585f3ce803dd9b2c4e4b8431eabfa08

  • SSDEEP

    3072:J4MadWqC1VXzlM/cKHhW6eMsdtgQFOtSMx6:J5XpxBPdKSS

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1126428541945393192/6OZT0BUAZa5l_dXX91ZVDef5S-6Sj2M5r_g3psLJjoV3Jvd8BwI3P2FHwxUcwNSIKulg

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2272-58-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections