General

  • Target

    2652-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    2b01eb51485379fc69a8734ea075e2bd

  • SHA1

    270d55a856c629053b4358e580b829b039f674d8

  • SHA256

    ef7afe666240cf65f07807c7121f303f3afff8231e6a5711fab02e59ddb1562e

  • SHA512

    495b4ad94a07199b07d3fe1f29c975c72e439ee34ae3252156f1114445b280f723d0da376246483c6267e29a9a746afa71e861fc8078da43723ee535b56a7514

  • SSDEEP

    3072:oKgUdemHL1AWSXD6FwA53oeg8Le2SDfhy2:tgU/hAWSX0/38Q64

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1153198816934244423/yByGzSfP6yreuXNqYA_koihcHhSvtzD0e5Zdg5YosXNsxeKmzpCfxDokPWCzzi9JZFUE

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2652-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections