General

  • Target

    1664-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    4a1eb1aa10625e805db6d9f7994b9718

  • SHA1

    86e2ee266342c17bb0844ecffaa98399ff6a1055

  • SHA256

    6c5fdc6e8d61fd6ea1cd156e969effaa072607759a3bb34aa08b1b0f71de9918

  • SHA512

    6aff872455db14911835cb9063e203c43b649b1984843d9809406beca2004dfe5f9f264559976313063de09f779d313a8d569442580cc2a42c4c2f32c36306d9

  • SSDEEP

    3072:bOLNHZ1xFp4iFnmSp+kS7w8B01HLW2mcldgaKKUhlXoSudD5XOt3lh3Io:CLNHZ1xFpxxmSp+kSzvzhpoSCwt3r

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6706655031:AAGkoMzTunKhqrnkbDm7gYvkmMRu4Mgw_Dg/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1664-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections