General

  • Target

    2712-12-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    1d31fd174ec8956c499575dceb96032b

  • SHA1

    a0fff19f7d20900fbd5042b2f76e6e978696c7c4

  • SHA256

    8b11a648d9711ce3efb7f4cf1213eb2cca26ae407be16a2d1c00a1ee5110acb6

  • SHA512

    0e2c5d48860b05fe787664119a300cdae99bb875f09f08fefed303b5cdb56d439aba5bd16e54b215aaf7c81a48fb21bc8446c411fde959a68fb8c5512aa9fe95

  • SSDEEP

    3072:WTtVw0VSRrtNTw/6b2T79ehhTVY6/h2awfVaG:ut4r86b2T79OhRF/h2Nt

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1143866479729717390/K-qxdRKbl3ZD79HQ8iGm1n-TIpzsqHeWaBEvBoTTR2X3ga-upcGwypU-L7xgKO42DhAf

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2712-12-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections