General

  • Target

    2612-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    8ce62d5a86e8c195560f8779619bcc0b

  • SHA1

    418351a49a34af6cae51211bb41efb7630ef7daf

  • SHA256

    064ba7e58ff051033c34ea41238d3866aa49f748faf1b2ecf3726de3e77faeaa

  • SHA512

    774beb2b2e969afbc1f85538537da4c5f9c6767ea38970b98d63c2e824f1d273fa9559690d4fe3b5975383cab524ddfcc241f01c56b35c92e38d2d1031fb84cb

  • SSDEEP

    3072:On6j3MDN/zTkYAaeXS71J9K1pMuS0283kI3:N3YJMrVS71J9KIuDB

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1149269354932875295/vMHuRqP7zOh3pQQSZFTmqkwPWLjgdwqQmdeIzcDbwRw-5w4GwYQxdEoRKYtlcARlLX6w

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2612-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections