General

  • Target

    2668-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    9cf300b9b67a14e3f2282730cebef43d

  • SHA1

    fc9c36f942344d312cd527869d8c30c531ae7fb1

  • SHA256

    6342aabce3668be59635633ccd75326e700ab67873e753d6d6de5e971ede627a

  • SHA512

    6d4322c755c52bd24e5efdff2adee9b5d6a75fa46f3c4361aa9ee9f68046246297af46cf1389c9f70d011ad7f5e89fbe03562d6e310ceb71e14c6a105b2ce711

  • SSDEEP

    3072:wCJpeO+eOfBp8rtpTHOc5JVWY30HDqFUjqRd5zsyutdIj9R:wCJpeO+eOfBp8rtpTu2cGFUjqRgyuT

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1177188919264165898/4kl2v0wvJ9yNFVjwO7OT82qwv_LhC2zK_vNKg9hvPWNj7tI26cZuPW6CMUfb74KAR8Jp

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2668-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections