General

  • Target

    2796-61-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    fb759d6ad02822ae0bc0546ba54e4aa3

  • SHA1

    27fda0f5404f924e128a2840f988254ef4018b4d

  • SHA256

    26c8c15096551e19231d263d4928c82b72ceece9026094804e90956840bdf679

  • SHA512

    ae6cbb252769dc525b957ef63939fc84978d7e02e934184089fdf0a005ffeaa1a1fdf85bd613872bf376a95f25621b67438296c134a67f6bf3adf70743c7d52a

  • SSDEEP

    3072:0Qw/PhLr5Dss2d274+LvA5hQ8q16/N89Iqe/Yrp/L9WF7TeLuw63F:q/tr5Dss2d2s+LvA48xO+xT86

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1128637427972571218/neJU6OrRb9kfbhPRxvnp2g6ZGHWGyX1gKt27hF6Ub6MGudFDlBg3-KRZUhC3mEbyNgmi

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2796-61-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections