General

  • Target

    2368-8-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    ef1a29bdc0143b9578b75ec63236f445

  • SHA1

    d180509c38013fa53b1fdcab60b1f539d466b5e3

  • SHA256

    9459c4ffcfdd2b5e23764b8b4e9ead69aaec386680b9c71418e4a5388e94145f

  • SHA512

    3c1e7fc6f1d5aefd2b894d19b226f8583918f9e3a877b49a6c3422337f50fefafd8ceceef94534e1fdf780e26071f97f6b5231172460b9ab04ded9c9b7eb6909

  • SSDEEP

    3072:TUctV8f+j9Mz9BH1K47BbJ0xrF4X7ckgWE:QhfF71K47BbJGur/

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151584869856587856/TSfqJPinoKJMQfdSxeC_i8_eyVJpSAyIfR01PmPrgyaBM0m4b-AMeuxrfwVpgEcqFcZx

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2368-8-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections