General

  • Target

    2572-13-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    b4f5770e9ba4aaaefc0b752dba190fef

  • SHA1

    e8186f134650001d2e679a4e375be68ea58be8c5

  • SHA256

    31ed5dbb658f1d0a8828557a2509ff3ddab978823995f35f070bd75bcb944fba

  • SHA512

    9dc0bf478b403c33157ea68eede68351beb422c09b4293c12156dbbcfb930b8c23a8672ab5fd20e6e15863205e77f21ea6f627df70aae0e0382714ca5eb13fe6

  • SSDEEP

    3072:FMULzoSeuueOzAjVE4e53j0xMAmTy5vx2Q4BGS:FMULzoSeuueOzAjVE4ese62fo

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7067796117:AAE1iWms108rYzIyw5GbeqEMwkMbnLybNoQ/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2572-13-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections