General

  • Target

    2872-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    1e95a4bac581d41388a57001342e1874

  • SHA1

    37afa942e546d255a77fe00fdadba30d400b5e5a

  • SHA256

    8ec9afadfa4eaf8ebc4f4284c97bc250546af228156e43dbc72355a6f9ae9b0e

  • SHA512

    703e7a6b0e41458ba5afff0b54044f0236ba9d7e0ab32970a30169c382f82a81b2c79603ed7c067356c651cd782b4c8ea3ccf4140e786af296b05015bfe98b72

  • SSDEEP

    3072:RE4L6bo5hmUrae3Izd5mU6eKCkNX4Bu4UzOel:C4L6M50Uue3izplKCeXPx

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151737072110010368/oULsZgCfbEOkkP-3xRtB8ZspMBtB4zI_WGsZN9XXV005aWUNMmMIxnuzoLIxokxlJUlN

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2872-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections