General

  • Target

    1372-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    7698e54fcd33fc54bc4fc9c1f43012ad

  • SHA1

    5213bd1eaf00503e5d9c316adf64eb57adac4d92

  • SHA256

    eb885aaf168a02190c0ec0097040490840819f079c5eeb87f753e11726769577

  • SHA512

    24f69d70fd603eed092a84eca1453aa1fc2ad7a20acb7e98bc55bdfe5856813908dcf68e471eac5813c9e7f1a5277fafeb2d839fa7ffd6c3c59d4010698c82be

  • SSDEEP

    3072:WZyJ4IAOeOccjQ+2eHpoVhZtzj2AzuGQqp5NXr9xeI:WZyJ4IAOeOccjQfem3n2AxQ8r9c

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6601795398:AAHykVzYnO-FQhZvS1CdJizylK01Qffj5l0/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1372-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections