General

  • Target

    1932-68-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    292930abd3a52db5331129e7631f6f7c

  • SHA1

    b6d06ccba3a38f82592d2a0a341216cff53edaa7

  • SHA256

    47d24e48b9f7981eb95980ff6bb4ae0783784cceb8fc90cb7a77d7b0c78b3bb3

  • SHA512

    8252de431c9e74e5a4f9db8da2c50bb14ed50c96750885e1875f9b381047556a5afea56952a9a87855d22a1d596e9476e1043762e88458f935aa88a61d0f115c

  • SSDEEP

    3072:LDlHKPAe5OIWCCbZhUJEMaMSqPdIwdCzaHT/sE:8bfGbPUSMrTdCzwUE

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5829039825:AAHUTzihFHkYnCe5S3O2k7aL4dVLIHvYzbo/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1932-68-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections