General

  • Target

    4660-0-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    5aa5851e70a0c8c6c8651d21c7fe94f1

  • SHA1

    4b0e5031595abe4381b2514208861665fb1ab058

  • SHA256

    591f09cd169155d8376cd1f8980f4adf1c5efcba742a09f4ceb1a3f4cbefa5fa

  • SHA512

    4c6b4e6c45d2073dbbd81d9e1c201c1748537b4fb41670e109242ffc960897cfdcf38e4089e6d63205d6c445233a472c0db49e3d0fbfb004b951173246a156e4

  • SSDEEP

    3072:A0VOO5ggoowZiwCHEgEjwXO+UQWgx5Q+9nZ6Fk:A0l5ggoowZiwCr4vQWgj9nY

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6899220110:AAEhS6HDsWPgi27wKN8gxlKUKVJ8RH74u0w/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4660-0-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections