General

  • Target

    2232-64-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    84cba426a510661f589ed64c9ee1c6a9

  • SHA1

    c558b7fa327526182f9b3867cd5e105973885179

  • SHA256

    dda0127c9a93876bce3342dcf062dd6cedcf72c5ed30ee6dd3e6b4af7e22302f

  • SHA512

    6505df3416dd20f7a500f11772c06bc6d4bf759175712fb70ac157636432e083faf10c68e536fcdf3ab972e3056f3c595c55379c15e603f8643ed2a54541f343

  • SSDEEP

    3072:ZYeVPDFbePfhCt4oK3Lgu1IaaMs9khsms5QcF8DAv8ugE1+:rVLFbKfhCt4oK3Lgtaacs1Ws3z

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1128910194290720900/0AyMNJ6aUtGeIqVQ49gdQ9w0Gg5aEtrZ4JdBoyFmUQfCBJD-m_dLcJMk543dZgBcHZPW

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2232-64-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections