General

  • Target

    2728-15-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    88a9d2315b07370ea5450239c2ccde2f

  • SHA1

    9de9af4d80586a8cc1b9ecea7da479e94fabdc66

  • SHA256

    8dd9eb3f5fa24224eb341181abc7f83db24432c45eca2ba28be66e2c24fea647

  • SHA512

    9cc7db2722d32385950111987548d5323c87abff4d42f30f6a14dc423239fb19bbd73881d13bbb7b9b15b230b18505bbb4078211e620ddf7cd047b0152c2ff6a

  • SSDEEP

    6144:38leOOeup8qDpijnDDHr3tg5qDNTySWE:4eOOeup8qFiDpCSNT

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1164647148105769020/8usoHRGoO-AonCx102bzk6qsKGrK-STJRJkdO4oOxLs749SD82CnugdL5-ebUAJQBDcA

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-15-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections