General

  • Target

    464-9-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    621bcaaeb50ff503b3859ecaca6e680d

  • SHA1

    39cce9da1e19adc99108a30aba0e48fb54ba3eac

  • SHA256

    e2e385b6dc32f38befd73892fc2c23611204cdc43fbcd21a9fa012c696357921

  • SHA512

    1d20ec5e4021e53e3ab0c9afb333653872a241bf8ef5a71bbd3ea3eb477ceb7ad6beda2543b755d435b9053c0478e0163a86502e470a5021b6373aca40538047

  • SSDEEP

    3072:cmnbXk1NnQ+Z9Ui9JJcVWg+5/pVQhLekHO/5C:c4Xk1D9UidcE5xku

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1150504726962647050/THqFlNLkhMso6vGcDeZibodDuV-dXvitE8cLmgt6uXXGYmo3J0kgOzNvaJD3jT1YvYP3

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 464-9-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections