General

  • Target

    2512-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    26f5a131b7d1df984c125b4421d155d4

  • SHA1

    266f5f3e991ea5907da7388e94a2f47533b1c5ce

  • SHA256

    4caf254eb3fd87f8df4376d5a705d165947c45b4e8e03b0b57164b8a30ae4c8c

  • SHA512

    66bedcdb1dde8f8149c8b0f04684ad611609de6e8395cf7f076bd2c469c953e8a15df6a870b511801174b2ef4e2c5a9abac127c1b5c651f6916ba4addb297095

  • SSDEEP

    3072:b4ecKlxGj5ksYWRJCFDfVWYk8Gs0ASQJuhvk0c+TbRk7:b4/kkjKaRJCFEbdhfc+T6

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1133291620918382632/dqE_masvBaWgRzB59nggrkJBKoBvmOr6eW_j0AXdmxr8iUJKxaehQyz1TL6QQaDldmii

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2512-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections