General

  • Target

    400-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    b3c89b09d02338500aec84171d43cf05

  • SHA1

    fc1cd96ac6eea176dee5b73d7757705fe2710370

  • SHA256

    90c1b5e3d22ce7d3cc0ffb5f23e72a9407354792e48068412589757ce99d01eb

  • SHA512

    a32dcc8a2bf777c6ef2ff9bb5df4b2746e185f08aa0615bdaa05e6cbda1377c6d04761b86e599be632a001d1f7e5654f62726c5710ed211b5a6260781b6df9f4

  • SSDEEP

    3072:NMpSyx578hGDhgBRaSOVVqRs6CbDjeka1HN:NMpF578s9gBRaSOORiHyj9

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6158061222:AAGNygizG-Xj58HoSNR_TcFFsMLQBL_ySFM/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections