General

  • Target

    676-77-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    edc95a30acd07f13895e3946ac3a9541

  • SHA1

    7156df9707762bb90aa91c2e723f99e3a7be5b59

  • SHA256

    18b7ace59d1a62c4db4efc0dd9bfc4ccc88a0a812031a7f6f3a7d4c27fe6dfdd

  • SHA512

    8d81e03bbbbfbe89174ecb7ae77d16fd90f291b279c179308cae749eac50ba3c725d0bb5db93ca6117329ca6cc5056e0178e3dcac0de3aebfe863067d3534fb0

  • SSDEEP

    3072:wdjH7vrHas5px9KjxpkZ/5qV6N5DgSWVXYMu4O:wdjH7vrHas5pxgPkZ/5qV68SWJ

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1209058275480445018/H-McbOnJpNYHQhHKLtNjlZha3IvLrUjGthxLuHaQ_h5rrm_C7srttGVVmosCSmH6SFWx

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 676-77-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections