General

  • Target

    2968-116-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    f699d8dfdef10ea9fcedc63a665ba16b

  • SHA1

    29d16391e1557a92ea6eb2c91b2c434a5c417295

  • SHA256

    8c4d102b6e41fdbe33ea8430baed6eff850b7a668e90c3435f98349b4b132104

  • SHA512

    22ad33ea6e37dd85c31da2b08aab1a7d91ee56081384ca445bc92e44924fb9178747e22028df30ecbe8bc81107966c3d81fe48ffd47e4e9d89d1121ec8d4c2ba

  • SSDEEP

    3072:Wb/LL6U5VELH1lpjQNjwh7BjyL6ABTq0+abVBCv5:Wb6X1Dj3h7BkO0+KCv

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1130464961609617428/a6fsRuxfMv44DmqziAFbZarXeJ16WiYnjs4hAz4dKQmT54EelfS3ZunWG7eXL_OvDvcp

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2968-116-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections