General

  • Target

    4640-1088-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    e25dc01b75a64600e7f9791edbb3d9b4

  • SHA1

    ec469f639dd3a4411e14aa42618abecc0425b9be

  • SHA256

    5ffbfc169ffaed64fafa125c95402892b1b0f135d4d7c9a57323a4fdff3a2362

  • SHA512

    6e6952166fef6d5edb0501f63e6167080c73970ed053fbf19106f469b298b3b66d6db07868350676ff36a230b56d05b12b32275becd5f4fa241f2056c8a8ae7b

  • SSDEEP

    3072:IRnARSvZ71GoEQ7vyX/FkvYe39A45BpZ7r0OqxM:IFAEvZ7IoEQ7vcuvH5BpiO

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1146195046077571204/dpQlTA2RWqbwHpRhYenNuZ3tutnraFV-lblztGJAQxmKVrNquGOPF17NfgQ4II1PAilH

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4640-1088-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections