General

  • Target

    4020-9-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    3fef39a4070de7500e7f617ec2dc1fcd

  • SHA1

    fa5f95fcd19964fb5e453034d079f7396c70c425

  • SHA256

    1d14f7551335aa3e3519f578b91ae2b0e78ac1b51829c0e1ae6e845cd72e8632

  • SHA512

    ac915d18f28befb559805bc5de60495d1b44bc812efbec85913fb0debbf9cf4defd569df4d4b38ee468380045705c2b23837e2aca285bc34f7c12cb3c60d0e7c

  • SSDEEP

    3072:Bq2QDASlP5j5fDbT8n/7v76XE7MK5HzPR6tcXOOqyQTA+iSOEsYk+6L70V:rQknDEK5HzPstEjsAndEkbL

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4020-9-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections