General

  • Target

    1696-10-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    75f12184c55d668e9f2b014140b763da

  • SHA1

    f25b3c88c2c09c429a6b44e4bac267a887859b60

  • SHA256

    33a101d1a60eb8e3199056e90b4d78a044cc7e5f5aafca38b7e620a69a1c3f7f

  • SHA512

    2907ec3702674e72a4c6a8db4e8663402fa2322f2dd2111354745142d04a5c37eee1dcabd44f0bea4cbf2b2a56a8c5038ae7a1fe6a73f46f7362dbcc46174c74

  • SSDEEP

    3072:wCJpeO+eOfBp8rtpTHOc5JVWY30HDqFUjqRd5zsyutdIj9RT:wCJpeO+eOfBp8rtpTu2cGFUjqRgyuT

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1177188919264165898/4kl2v0wvJ9yNFVjwO7OT82qwv_LhC2zK_vNKg9hvPWNj7tI26cZuPW6CMUfb74KAR8Jp

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-10-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections