General

  • Target

    4248-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    d5018c1eed89797f075d182089a2d336

  • SHA1

    8f3f700749fcbfd09fad5a58b0201f50de0a1aed

  • SHA256

    d29ae9050c9ec1e1bcc5c6cc2c819cc224cbbeb8db0b939e26bc955d512ca6fc

  • SHA512

    779b6e3e3b663356f848de99c4ac16cea9f4962b90ee4ed0d97d71d114bfe10f0ee1bb634695be984b0e747a3c9f9420391150627d6c94a841224830e9e2c1bb

  • SSDEEP

    3072:C2S0X5xhpZ87o1ImxeXsh8pkVIZHvRPeW5VSO4BtlK2BDf:C2V5xhpZ87o1ImxeX/FZHvRmCIBtg

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1181759713713602600/iHsQ6OYa_KMNpOIA7OYiDu7j9BWVVvJ0gcEWr8VRve7tDH1TR5LRILIK1jr1NG5T-29a

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4248-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections