General

  • Target

    2664-13-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    458bfea0063ccba64c3301e640a6c99e

  • SHA1

    8a956bebb8efcdfba0c0ba7df6184dc65f5bd724

  • SHA256

    98d3341cf3cb175184b3ccf2ed2ef8e9160554fbfdfa661dc695e50eef6acfbb

  • SHA512

    94d37585d63522eb75d2a04c4278bdb6c758b3c13f3f3fa41e5c78d191b9542e636d1a5888041ef00f37f66c3b9945b1aed2d129d5a90e8c81176ada8414becd

  • SSDEEP

    3072:o7OzieOOeunVKl9CGcb6xMQRQ5I5R5FIRlPBrh:o2ieOOeunwl9XxhRYgFID

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1197853242999197757/GiP3FvPLWO4DCO5AQ7p2xSRazpswX_GeUHNIfDsCo5gjtTLWG64TOkaNzaXUzbPc2LM1

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2664-13-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections