General

  • Target

    3040-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    3239b4a936a29c29b77f765c98f64926

  • SHA1

    6e238bd031fde15ff4eb889946d7d26f4ee4fe0f

  • SHA256

    ef31cd36b01d5d021b2095d5cd033b2f31cc8e4568eae2451913e9018f7cd6ba

  • SHA512

    4fdd8eb8cd3b244d25fe9ee3310d7b2afafdf9bd3cf81a11c48c577a15e02515db50b56c31f935a7b0eabf49bb8306c5d25ab0ab702430a0f65376c0f73d56a3

  • SSDEEP

    3072:lzr6Yztri5lLywH+b4d/89aYxd1h5TfdSe:Vfzw5l2webbaovE

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3040-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections