General

  • Target

    2056-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    6e16fe8f06f994ef24e9a456222d4a51

  • SHA1

    5d53756b998029e1c5c2b3ee5f13378cf0782b7a

  • SHA256

    82a842757dca33338a32fc8ff51220b9e88cf2499400469746f14d0e6a7a66ba

  • SHA512

    5c380fdc9872d41cee59b4e6202ca61f6625bfdd4518934edba6ece12efce50f297b0b23fa61ec0796c73cded003cc3caf552f1c1a492365a7af316c41643fca

  • SSDEEP

    1536:Yf0Psog8gvmrTNZSlXnJlgYTTEULMqmHi3SofNR5Q3vIEvF91QRwxG+yKLa3lIZc:YD7Rz5l5fm1oRQgE6RXXKilIk8R4

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1144557520099229736/sL_KTxMkQs6a7Osn3Fy1JXnZWjTVJfZb8aIo7EVBhkdhgrmStPrOMkEtkagisxfaq3gy

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections