General

  • Target

    2612-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    99a1a60bb2da68f0c7aae15496d912c6

  • SHA1

    bd420ea7b5cc67e01e166c34e17e393dab79a29d

  • SHA256

    e9f85a7111acbe89f72130495310ca92773a9956990b8c9206d66f75504c1424

  • SHA512

    273fd1e1b93e8808e385ded7e9bc4aff996ef820bc61d070112198b955809620c4289902b85692b0cdb8fc95ea4c721876d752e5a71b7bde467c795f8f7456fb

  • SSDEEP

    3072:jcRThFzIkQLdxFEJnTYjVWYmMNCLV9OpT1+VK2P:jcRokQLdxFEZ3MAyp1sP

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1154526379132600391/1qrCnP-hJeINK0JcKSqwm1QRMlzeZ7xjQ6YgsF-44JetKyhzG7Ekq21pm1Acxb0hwYdI

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2612-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows x86


    Headers

    Sections