General

  • Target

    2980-17-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    c39a3141c7b6f1793da422cf7e513ea3

  • SHA1

    ed3d4425ecea274fe7c3d45316a6ff72c872fbbc

  • SHA256

    fdee23603332fad741fc063d576b9ad166327edf68ae75a1a7a3397dd4a7a9c9

  • SHA512

    5c6e5d6e8b5b872230786566d676890057f503f4df242024544415821b1c757ff139e687163b197a704bdb3d1f69628405dcc75545ce538e1f79bf6f990edeb2

  • SSDEEP

    3072:c0sHwdxLhXIVs/JPPbUpeBrnAocNsBJoFUjaFPMdlSmk:cmdxLh60JHbUABrAeS9FPj

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1151596988136181840/QdgulOKX9Onw_VaSQk6b3c5Sm7_Mt-0_huxqLUgO5ybBxQL_jiC6-2Afk2vAsJOZSANp

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2980-17-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections