General

  • Target

    2716-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    873b8ecc9ddbb43361012711c50ac417

  • SHA1

    3b3fda9b4cf1e4c13bf84c900bfd7a7ac0c9452e

  • SHA256

    ecc2d5c756cc6bfd1930a9f43dfa2f1aa869e1c19aca1f9b065ea9342c7561c8

  • SHA512

    7ab7d8a10f5de4864702faee726a3f934dd15eab8ee273cec74e5af0aef0677520e56e26ce97ea9a220384af54d3c2ed7a008f83b3c8d73640298c4fb02339c2

  • SSDEEP

    3072:/rE1JLOwIAye0m4zWCBk8EGsuvWVEZO6PrQ/AU05:/rEDnIAp0m4zW5qZFZzT35

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1150611970358255616/TcoC3JrTki0Xd-EXOGznvPK0OsuJm9IeeUEQvrN7JXow_2oGDOWPWLU8gGbdLwevrDns

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2716-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections