General

  • Target

    1884-43-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    2d4c38c90028cedf4f0a3c92bd64e438

  • SHA1

    31a8143937e8be51fc7639c9ee38a758b1e2f008

  • SHA256

    3a3787b65414dc5c88a2f6956adb1e8e78eddc646d84d6c8cee0c47cd0ebf0ef

  • SHA512

    b9024442ec2d5211a5f6a5206097733e20a2429f305a8ecc82c75909c3ef10e4f65013e46ebef79604c5561a65df148d435a560e6206fcbe7effaf08938763d1

  • SSDEEP

    3072:lkDULTrIAOeudzvjYiIEoq4dbKMq5nBAKBiN:lkDULTrIAOeudzbYvqkKM4AK4

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6888405524:AAFs03Xpn0T6cMtLnkT-8XOF1Lm2jt7RNyI/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1884-43-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections