General

  • Target

    1208-10-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    3140247305ac101f49e7b034bc03663b

  • SHA1

    9b25ecf93e1e967c8e653bf3d6df9ba28aa59389

  • SHA256

    3d39c4d3abecd0abecaacfbd5afecf9eefc7b0642ea879cd3644bef31f3aee36

  • SHA512

    1672302a3bbf73ec0b250065e9c69fa9c109df0215e3b6b43111a6687683a4a7d1d00d850d29c51f504b4d9b2f7868fb98083d41d58ed4bcbedd7dd38b64dc2b

  • SSDEEP

    3072:2QdTAN3MUc5OqQ3DiyutHNToB5BE8U5rPGZmhRY4:ldTAVMUc5OqQ3D+ZmO8KeZmH

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6940767976:AAEh_SwiKBJ04TyNZIrvXVlVIhsjEJabqkA/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1208-10-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections