General

  • Target

    4380-1089-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    ef0a9dd19ce848cf7ddd48ad25bd31f0

  • SHA1

    b60f69ffb6467c1f0fecceaac038c07ff2fbcdae

  • SHA256

    28d0fe5855e4d39d617d3c0ed792b07bf6d6b6bdf681ce7e65d31009bd5692a2

  • SHA512

    2764a8cacecbc17b30df5bda439ea89f058134e80fbc62240f481f0d56dc227792d376805ba79da02166c451049af32909bdd06e4811496d8a64a57e5401b266

  • SSDEEP

    3072:KPvSeWOwvjRt6YhU1vixVWYigTn80RTODkJCoV:kSeW/rRt6YhU1P8j6g

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1141471208404164848/Vdsy4bCqoScZDpXQcLSppY-kbkWr-wUI6r2Pf8skERiNPQqGy3VRmZ_rWA5jpiCzDoha

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4380-1089-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections