General

  • Target

    2160-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    249a525774a33441ec4cf413582308ee

  • SHA1

    56fe3819cec1e751b9d6bfd0225fe8d935c459a0

  • SHA256

    019570b381f8e9cb3863fc5503d39940adf9aca72f224df66f865ca0171cc2c8

  • SHA512

    77cd0a994a78ddfd489531182499561883298190c9d0d3616abeaafe9cebbdba8cd67669e4416f0909f4be59fcd2a9c6968f917ff5a2e7fc86e7b493b5ceb6d7

  • SSDEEP

    3072:A4lO+eOe+cVBXmpZjO6NMQwn81s5DAoeiJ4zGwrR:A4lO+eOe+cVBXmpZi6aT81IeiCZ

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1165931672190062623/xocVCXu11ykH0Cs7O3JFYaLzZ79j0eLYIEn9ff9w-TITbNQD28E6786MfHKBxOdVDon5

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2160-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections