General

  • Target

    2740-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    ea6063b4d1565e4680b3e3260797e1b2

  • SHA1

    25be48624daf15f9f8756deac7ebc17f8a56ddbc

  • SHA256

    c70fea13ca1e2e2dcd580ebf98805e128d1ee949f0009341cac142694473a5d1

  • SHA512

    e2d3217597413a3570833c883a93d5a5559dcef11b6a8e2be466a1f483aba741a25219e756d488e432655b82e48c0eade71365c10106ca1f810ea1defbeab91f

  • SSDEEP

    3072:21owe+eKP9T6e5QBtlCfdXZgWiJc5v7XFF1RVO4z:21owe+eKP9T6e52lCfdXZPiJIFFD

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1159280255119413409/OIqP2mSnppduKZmA2SrGwd6G_KnViZGlCVXwjMF3yE6fUJ6AthXz8txLYbQuMqz48Gvp

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2740-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections