General

  • Target

    2764-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    2e42768323b71e3ae973c0251a659941

  • SHA1

    b934174436e8c47f01b9aa246f28eb675f85f181

  • SHA256

    7094b159d4eea875337c18883a8e610170da30aad29a3f141f6b1235fe226355

  • SHA512

    99f240213e1672590afed725aac21766ed848a702b499b538c1780bac6e968dc75968e96189d75938c702be355cf84e4efc8c7a0277e633640040db52b508766

  • SSDEEP

    3072:RE4L6bo5hmUrae3Izd5mU6eKCkNX4Bu4UzOelB:C4L6M50Uue3izplKCeXPx

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151737072110010368/oULsZgCfbEOkkP-3xRtB8ZspMBtB4zI_WGsZN9XXV005aWUNMmMIxnuzoLIxokxlJUlN

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections