General

  • Target

    1860-64-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b735676f143f7db5d30534eefcd3d555

  • SHA1

    c74e28bba37c24bd5ae32f78f9ed9f210141ba0d

  • SHA256

    6e02fd0b018ed4c3dc742984aa133cb240b8a8d104f7191ec0729173d85e4151

  • SHA512

    13591e63ae3e5654b6a03ac7d263ea2085698c9a9f7b81a1146a1d4e95735b82a32b0a95769daf29a50be79d784cde768e8f0aa6a87ce205fed2cddecc811f3d

  • SSDEEP

    3072:u98fay73sOcrt8ga6RrJPTyZKkCFLYa/QxxEW0gyA7e:X3sx8ga6Rro6lYa4xxqgy

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1860-64-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections