General

  • Target

    1912-66-0x0000000072550000-0x00000000735B2000-memory.dmp

  • Size

    16.4MB

  • MD5

    39736f38a5190bba2d2563c484bc37d7

  • SHA1

    b9b7b87cfe3cc0e8e37f0df601d762d247f3917e

  • SHA256

    c0d91df921d7b8f00cd0bd74d73e4fd711ded73a69c2eed6784b2fe397add655

  • SHA512

    f21f53e6a2c96eb426fe2da3bc18ff056b538607c4f5c00a7f54d1c5dd10fab7be5fb37cffaa2a036e7dbced550c6000052c6fa9fd1706ce2bdd994caedb6b4e

  • SSDEEP

    3072:GwoJ9R9JifK3pTNj36H5lCrENbp3U5ZlvrrY1XSA:GwoJ9R9JQK3pTNjk5UrE9p3mx3YB

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6225333215:AAFu6RyUqp4Klj6s7zuEWrA78AFP6bYaof8/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1912-66-0x0000000072550000-0x00000000735B2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections