General

  • Target

    1284-64-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b45e891e410e2d4af8446faebfa00592

  • SHA1

    a5cf588403b072ac79ffb70db15e05525bc68995

  • SHA256

    f350038506bf2b4414adb91921f85e6107dde6e3d1b3ed21df9824254b04582c

  • SHA512

    995e15de1bf0ecf45879bca99fbc6456ca5903dfed0634740d72f443dd64e38fcfdf15d362d5072ddfe37bf92cc080c4fd8af96e1dedb9b0e372ec440ab3317e

  • SSDEEP

    3072:rQnOVnIEKPA8k1liZZH8/WTg/hJhjEhADCaq34n5ZlbOS:3gPD2lUZHmhJh0ADi345Zl6

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5929361225:AAHYSCRfSoLkFLQ9yrF9dKq9k2crNN8ry0g/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1284-64-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections