General

  • Target

    1728-70-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c032f562d5c57ba14a2136025c7a624a

  • SHA1

    46578eb58bee3aaf64154fa3b22cf000eae44772

  • SHA256

    c83981f8fecc8d878926b176fae6500fa8603356e3adcfc8d44c8edb74241615

  • SHA512

    846f56da7a68dbd612f35f91a229b65c9a5b4a530c98820509dc76aecf699afdec00dbd9112deb45832d2b2653040082208177d8b3be3b95168685db6e69d775

  • SSDEEP

    3072:FFyBVhK8cOfOQW1eMEAOL+89GoU840sUIOB6FbuQ1sm:XCVgzR1S5GoUVnUabun

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6311781507:AAEuR5ZmBkJnXXsSjWZT0YSOmeipZXlW-rk/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-70-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections