General

  • Target

    2648-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    7c35062d23c267863624c7ac2f6b3370

  • SHA1

    0de85d518dcd137ddbb1ad29f415cc3acd7f8429

  • SHA256

    4439a1388f93080c3dcc27cb86d541a818b135dfcd3986db6dd8d11b9d7749ad

  • SHA512

    7f78c3f1ae925d893bbfc1a1f95ce5dd7a6f5d69b205fe2a4dc90708b4a2094c236f0260dbcf963099b13cdbb18c5176454962112b749957c7297076935cc596

  • SSDEEP

    3072:WwcmxFbF/0c5/72VRoVWYOx3Cw4fcsgvWyA9o1:WwH/byc5/7mx3CwEe+L

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1151736280481275954/-cWVVtMV6DDO5Frngy8Hw6Yg-3vUt8Aim3cgeGjoFBtezbpylfwU8mkPNZLGWzsIkYXJ

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections