General

  • Target

    2092-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    2924865a69554caa81d7217858d7d363

  • SHA1

    c18556191d00c56d574aed0fd0dd251ccf568c37

  • SHA256

    8d6329f4d2595de7d1190fa902099a52f0f37cb08c08f32eb674c3abd8c59510

  • SHA512

    48bf24293c952143ac262c4a424e03518ce033037405a0557c96d45f7cca42879937bc5245b0cd7e0c9a55e47b3c26941f62fddcc5460447aeb26e863da9b8c3

  • SSDEEP

    3072:nPJzeOOeuHXZWlp8irPrQOM8SCCUtPEK5Dc2DxKcdr:nPJzeOOeuHXZcpprDQblC5N22Ds

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1180980368132813040/F2kog0SoqSzwLFrqkGYc1qWEL0L0-wOGxHPYQ2P_BUqwGK1UmdtLRpT5k4dyoY6aTmvE

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections