General

  • Target

    2304-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    67e27c8e869abf6a8d9cd5b4a0538262

  • SHA1

    cdb06359f105aef8f65ab5b8d42eaeb265eacb23

  • SHA256

    c4814fd325ad33698d457acbf5a68d73d3d3f44c4670d4231db13d4b573f0e7a

  • SHA512

    f717304b436244e0ef5bf5c4a9473d323dceaa30288f698bed2f90ab7208cb9b826c3daba69542d9104ebdb46a8109142f64a22912fc84f578515d6512f3f9ad

  • SSDEEP

    3072:U67YcolcZobqhm0tKHo+JEwmlUgx1u03Yu:p7ARqhtUHgwyDZY

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1153542142246006804/y2ecusetMOq7ROpPMjNkj2oJRm_CskSPWA7tuiZvu8D9q0tBgf4K8Og4xq8mh03jXxGu

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2304-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections