General

  • Target

    2904-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    271d39ae4c1accab0241508b3b094a61

  • SHA1

    25ffd1659ce2a5d944d81d67f024bb3ab214e3aa

  • SHA256

    382b32a91275d2cecbe1de58b1feb4999993973554c9df13159ea10d97f0d988

  • SHA512

    e39d33bafb347e75dd60b6acb9fc375d366d8c8035c3fe4d24af12ee65519967cb563decd570624c2a76ed822c53b339e9730cb6dd70c5603bd32546f0210569

  • SSDEEP

    3072:DUtxa8VEiZmmxewL/0JuVWY5I2F8cRiGjrPrH:0nEmxewL/QqI2F8zGb

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1139484107194249226/Vlhp6hn2jQbp2Pn9C7HitXwMubSUxt8jvVmjiMzLvA0UTXInxNbf6E9L7WA2v5GWOb49

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections