General

  • Target

    2720-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    a112181f9914e046443ed11ee4ef5983

  • SHA1

    cb545726f4577353b25c1a55e107555b06a12a06

  • SHA256

    5c45a4545396c5b5492567a05418266f51cc7bf02148ae125b575b77cdf3f309

  • SHA512

    71fc409bb9fffefdf31e59f23443224407819a89aa0a8abb5bbc4194ed1bc9748d702af5d92dc2f97582ae18c64709f8a2f7629d476614161a89f550b03d34fe

  • SSDEEP

    3072:dDdCnJjVmXgzX/XMZRiGlTQg99mpPUtyE:dRMpwXgzPcWGlUg99met

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1146746844320374814/3fxDB8C2XQPGGhnfjHRu7Cea7CAgISxIJyqnyl0qnbMrxj-fBNT7Nk5DNdITDxn-HXEF

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2720-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections