General

  • Target

    2120-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    39422998c323da83107d4870ca7efa19

  • SHA1

    2b3eef92cca423082874567cf690f8183044b6b7

  • SHA256

    05db4dffc5a2216503113e35768ae0f183bf3e111b2a4c6d5fd99fcfac97d241

  • SHA512

    402423b1dd87231aedbb2cbfb8834eb7f178a0b4b9486c2839232740225b8d317f1cd715a42bcccce2bcdb2db47df2ad8eb36263c22aa29d409658268b943233

  • SSDEEP

    3072:fsRRJPHN75iyZ81ekzbLc+iplTKe2TxB:URRJPHN7IyZ81eYM+4Ke4

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1145972821810495569/PegkyEU-M73Raf4uQETS497Tswn1FxpE00N5s-dCyvCDbhrDKLRqjlMsuyVcuMi3eJW-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2120-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections