General

  • Target

    2636-10-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    a6c0f64a642b6434177b20f497f7b7dc

  • SHA1

    cb0c7768e0c03b620a2d1335dbfa9377f3347e82

  • SHA256

    6cba3121d35fa8e683700d10002c16bd3c322b99c304e924c5e16be1fa77e516

  • SHA512

    e5ebb9718dac19a30ff9fce6cf903791c6a9132208340489be3aa138c664148a66e7bcb2038578556bd08798123971a6740c67f241c57d0c0500a4da41a8f58d

  • SSDEEP

    3072:WI3OrXeh3xyNaOjHAeqDeLgwE/9qH53ZqxySP:WI3Orw3xyNaOjHceLg1/9qZ3Zqf

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1153718958092980356/Dvx2X0ZOxB0JZvA4-WwKsAgWMUkF9A_eS-zWrNoS11pSjA5BUHkXszsb8yuPBeG_cQYi

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2636-10-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections