General

  • Target

    2848-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    138dc46ce9554dd92083a7e5a648840e

  • SHA1

    34e4939396b1351a7c97600ce193e244850faca0

  • SHA256

    d1dd6f5e32f43751bf2966dda747f368aa8a847997a5a24452e831956b35ad62

  • SHA512

    3a2ffe4a32dd1799a402fb2945248f6d7416391189d09ff92bb73598072287db7f0237b18a463d898a154e59574b074d6732be43b2cf901d87c99bf72b6df6f0

  • SSDEEP

    3072:LKdI53MLyKnhkGmyoIxrQRsqZF+3JZQxjKQ2f7UI:LeIE7xhDmrQ3JEKj

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6383519256:AAGk0rgduRPbzKe2Dtsy2SQfp_rx9ByiGnU/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2848-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections