General

  • Target

    2096-65-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    f8cf96c2d03903a812582703fc9380e2

  • SHA1

    5c132dc396312eb8b4bd90881f99d6c4df7d013a

  • SHA256

    dfb0ee8a2c040fd727e70647c72e013254fa386d915653cba39f58c90f1e5923

  • SHA512

    418b512f4643d6194caf158eaaeeaae9f689d7a7a20ecb6953a004ba64cd98fdfbaa78c0acc8268d88d14b0216e1d66fc2565a32a3b384951cbb15e4ee9c461c

  • SSDEEP

    3072:N3kPjENIn7jVecKt1bAomV1dRaK3CDeCiO0YNCKF6mpHhq:N3kXHgcwMLvHO0YtD

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5932003035:AAEaLtKkDh7_bNUDpa9r7bYkVcMTGKSmWaM/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-65-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections