General

  • Target

    2000-60-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    97bb8cd3f28065fd5b529f0ed4b937cd

  • SHA1

    6538154b7accef625b655f61943324924783ae0a

  • SHA256

    241117264a5058b697a0f316398773fa3e5da5d3a910a1dc076d6c23894babc5

  • SHA512

    3ef0990510992f2016745df1d1b8cc21aa1b6c87568a24b63d05b997e22140143409fe5a666371d4411f4d85d1e7c749f0e8e1405046634147a37285b215cc54

  • SSDEEP

    3072:xXmd9wtNit0rsL9c9SHukwU0I5dQlkWCDASXO9lYyoBlBmw4VyeXa1:xXmd9XZISOkwId8kF0SXAlYyeKVyMk

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1102722564712841296/3-EpoUbqBExsjHTlAszTcqqS1MRQ8Tai6WQXR4RQMFNg3cR9b8adTdUAL_l__l4PCJKc

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2000-60-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections