General

  • Target

    1356-6-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    beeb37ed53cdec79556f49f672fc3822

  • SHA1

    04e56192efcc90b85e7c41d1cea86bfdb3d6610f

  • SHA256

    599263ef10ac63e735f76ce9184ebd65acff4c43d3ca42670c93a24c9211f572

  • SHA512

    b789b1df3ca8636d59f1536259c93f6af3530ca2daf11f141a705995f1a03ff3316944452a99622570e609a8c286691ffc5ecbfd39c935bf136ccdb3b916a4d9

  • SSDEEP

    3072:zMaTSjKGwrb8XsjGXldz9eBwbqczqGMaehU:waT/vrb8XsqldYMqkqy

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1151743910964625489/OTxrHUj4z0z7EdvsMCv8cUVw4Pj5qv9XnrWLQe0n6Z23jJyViEsxW5Q4xb6c-PRpBi8w

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1356-6-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections