General

  • Target

    2300-68-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3ec15cdbe670a5a6dc6a83cdd90b90a6

  • SHA1

    aa5c9a047c9b50e833f63ca8edf03cd06f734ba0

  • SHA256

    3442febf1fbc2d5781a5f2b60b913e329d5b02c82a5f7c76b8ea4f96269daa57

  • SHA512

    6a93ce01c91b6e4049cd9391b2ae23e494a8ca859878935e90ddef2b184efdb7fae55fa33a8fe5408d88324ac7261d87a1be3aefd98c57cfc21b78342b2fc841

  • SSDEEP

    3072:CF2bdsDOcGPXpDy85QiPHT4FSA/V1pDWtv5VkbaRfsv9gZ2m/+5xBBN36k:OFOcGPpDD5QiPz4FSArpDW1YmR1Z2m+V

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1129800822616768643/7ZulG4snYd6G5St31jRWFPvYvlDZIOp8XVPAGtFLXTo-TIZqkaS-kUjRfS4LmgDPaRn-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2300-68-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections