General

  • Target

    4000-144-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    d01e8efac80e67799df433cb01b713df

  • SHA1

    32f33cfad0e9276cd706fb394095610393bcfe2c

  • SHA256

    703277a54cf9d59c5eee10e4ee4ed962a3693e28456c235f5517258035d1afa1

  • SHA512

    00cf45695d95e1e92c1398269be3db0c9740e6d446ee5a409942aa0983f6f41e228da2caf7a42da1548d43030cc4b284856bfcd4792b4e004a31094ca30d07fc

  • SSDEEP

    3072:Y5XVv642sBaDVSW3nkuDV3cLtZK7gq9bBRkZ4zuuM172i:Y5XVv642tX3nk+xkD2bUMm1

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5515611206:AAEcQSX8hXHOAxSYr8KUdLxGF5eqw4FRXoA/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4000-144-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections