General

  • Target

    3052-9-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    8c6606cb8c08e512d16a07d3ca6b4612

  • SHA1

    c89b7ae00322c928fe5b16fd89dce095ea6d1c05

  • SHA256

    8fde881058cf2024431db8e620aa9aa811d3914520062187dc076913938610dd

  • SHA512

    d7041aab6eaa1fc3ccdb12fcbcf82beb7678c57a2548e2866162401ff861555e0994702bfbced562759da28790ec59a32ea6f3ebb6980aa6062eff41881511bb

  • SSDEEP

    3072:TUctV8f+j9Mz9BH1K47BbJ0xrF4X7ckgWEE:QhfF71K47BbJGur/

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151584869856587856/TSfqJPinoKJMQfdSxeC_i8_eyVJpSAyIfR01PmPrgyaBM0m4b-AMeuxrfwVpgEcqFcZx

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-9-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections