General

  • Target

    2600-69-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    d20c71993e42790e8fd73767b9c37a70

  • SHA1

    d38e06138ec89f7f98e6afbe886230567268518b

  • SHA256

    12efd99a04b90a38a9d300d1f01d995f0adae7036b6c5b8bfb6ccacbc54cf0e4

  • SHA512

    f0561d66a968c587c4fadc0adea0637a8eb462427c358dbf302ef8f29ce65ff3ae945b06affb0226f66695c47db9259530caacd794bc72269060f0e1ad6d520e

  • SSDEEP

    3072:vxxvQA0Lfjf7qffaZI15z3GkAwlQv64fJ7/Vd/m5kYSwh8Y5rUNc:f4XLfjf7qmNwlA5fJ7/H0Swa

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1205132658615521340/dXN_opFfVQHNCEqaIDBvWftssvXsy3m2X-ITGMoKvxczcCdrrYX4qoNHe3LnP-KQUyy-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-69-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections