General

  • Target

    2744-22-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    b352d0883bfcb50f9723f33bb6d245d4

  • SHA1

    71682895395fe801d0d49b6dc6cda9e118cd132b

  • SHA256

    21c71e2f77a87c1c19c7539b20f4985f8d9fc71d0f7bbf95955a00c8e8273d92

  • SHA512

    1f06e23dfb486e89eca78fdf8beedca0afffe70e600afcd8ed4790ebef34521c516c149e74398e61d6480c3c4b6609c4e00c9d8f167a08666b4130702c5d9aeb

  • SSDEEP

    3072:2VmSO2wQoIghQ1rZoM3uv4eMl2broQwUUp4PvWY5j8HQ1VZP4:27O2wQoIghQ1rZgMlcoCMsvWLHQz

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1168159282777297017/MUAIjWlM_sNVaYWkUT3VCsWKzpucnou7Ds8dRGmXEUGJiRGAR8Fpy9VSZbw0hnYctJfr

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2744-22-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections