General

  • Target

    4172-172-0x0000000000400000-0x000000000062B000-memory.dmp

  • Size

    2.2MB

  • MD5

    1d563b76f2cf15bd4dbbb17eafdf9188

  • SHA1

    c48f213b4bdbb607105f56e921a5292a8e8416fd

  • SHA256

    818ed82a73ad52cc62905df92c6aa7217e2e17d307647a2ab9cdc8ece0bca0c5

  • SHA512

    51644b3067d55c02e4e55f99291d7cac166d7f4c6cbf5443b51accb951fa6d4ec8340fc7ecfb8f5cc79795abe87f30ca8158b8d305b37e8999812acfe5e67e29

  • SSDEEP

    3072:Yg19umlDjiao6qc1r4ESUt6c4uW/4MHNFg7DpqTeMIVPGZlRd:Yg19ziaWecEHUcX6fqPsrR

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6168599451:AAGNek51QMYNhL09hhnCcUs8a_1nMuD4d9s/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4172-172-0x0000000000400000-0x000000000062B000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections