General

  • Target

    3004-73-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    003fa5c4b37d946503cac787b5402c72

  • SHA1

    a9f59a06c044199f563aeb356d5b8df3e5d39668

  • SHA256

    623de74f4bb273cef1843c3d96ad7c456fabf25654056b6d87de980817a24d67

  • SHA512

    ef0b22d849716413ffb9bcb8090c6bb6ead9884eea6e1eae68c7d8ec0518e7c198c7121cdfa68f0fd863bf5fd89240b44841bda2c843b2b6fe801df1fc4f2ab5

  • SSDEEP

    3072:Z7jLLfjf7U4vuG5+FW5sSdaxUu5y9HXoh73i4ZWQl:ZXLLfjf7UAnlqYaxU5Xo5

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1205053859760701470/zEcMtN-LdyG9d_5j6FHXEYO3_VL2BXys4pdYdS9SngP-f9O14c-2Tr_I_gJCn-t3-7GN

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3004-73-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections