General

  • Target

    3032-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    9008c986a092256f68d4c47bc05f4e9a

  • SHA1

    dc5701cbdf432825541a0976f71287fd48504917

  • SHA256

    81a8241aad912a5af32d5439944b5dc1a46dcb360cbaea8e27a1e9010b2aee7f

  • SHA512

    b51b0fcf5d0659cd03ad3ac437a694e13637e95bcb02c91a0114c98e6ccb203427c658932ce33bcd3de63f7b71cfab2a1f97d003a827c2cee225c7d8362a0a92

  • SSDEEP

    3072:jB41nEDfVjSH9zgpWTVzfMU2P14HO7f5xfnNn3O3p0EI4M7z:jB41EDfhSH9z8zfnNee

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151796292247363614/j3dgxclFY2sX7r0KIAxqdfL6mv5PUyWlIUxF4BX83Oj-Syg78QA4mGrbxeH31gclH-iA

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections