General

  • Target

    2440-69-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7af65cd8f886c2dea967aed23d2df589

  • SHA1

    d2e7ce75cbfbf5fae25e4ccef8bc01c82b760dc4

  • SHA256

    7ab9e3d99406efbf48b7e17f3e64532286ebd54599642b5aafc44306b37fb02b

  • SHA512

    8db6927d160673f064c5e23bda9e62aaf4c1267e477d4079e60f553f3f3e98ca9296dcd5fad48995f5aeb7443fadba3387557951b343c2d3092c9385e0a25af9

  • SSDEEP

    3072:bYeVPDFbePfhCt4oK3Lgu1IaaMs9khsms5QcF8DAv8ugE1+W:ZVLFbKfhCt4oK3Lgtaacs1Ws3z

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1128910194290720900/0AyMNJ6aUtGeIqVQ49gdQ9w0Gg5aEtrZ4JdBoyFmUQfCBJD-m_dLcJMk543dZgBcHZPW

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2440-69-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections