General

  • Target

    1068-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    f87732a004c1ac6e9066281cc54d3d07

  • SHA1

    18fbf5c2ac8770e5749c9e6a578080244b13f962

  • SHA256

    33c9fb6660114407a0c09488fae766b83a1a5af44dcc797167c99178abcc5229

  • SHA512

    c623e7a5fc8af59304f19947649e3cc064bc9f40bdb4aa461007ba4a0753d19c42df54c968d59a66a66ef2cca09fc545988fba69bd66b4697fec7f714a679427

  • SSDEEP

    3072:Zw6r6AvHS4+l5bm8pVxewH9w8rfluOE8idmwJ5ch:Z3r6aHc5bm8pVNeeEPmwU

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1155632175954280508/UJAHnim5EEI9C_FOdMt75WQIx-LpUygiYRchNShhIadpLPi-9bmzOnR0zzqjFcqt2OV4

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1068-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections