General

  • Target

    1656-59-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    acd0b70b66b65281776fcf7e640c8c18

  • SHA1

    156c26b98f549ffe14e6f691bb1fc36a952a0f19

  • SHA256

    b036cae4994bd39333b49c78a21a01db6eb64ee292c8ba28bca66372d317dbd8

  • SHA512

    51fece37e20f81b90b653da9617c9ffe32504db6f4f43cc8c71385517919b0c21625e3d342170ba47d53c01bf88d3bab6524945f51578812b8173096b3f2ec90

  • SSDEEP

    3072:mcjO9fMCLBrqx1L9cPQsQ44hGu8S762F4w1tJV:mfrcL9pp73b

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1117589310905008348/F5C47t7BaLpeM8FDeYAPlc1VZDSBDW4yWgnfRhyHheIwnHJbW6IQyYTFZK45JDuRJ2N-

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1656-59-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections