General

  • Target

    3540-135-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    a0456f0580f4b374f1d9fed89c12c89e

  • SHA1

    269e748016e423cdd8b5fd2cf065afccd81350c3

  • SHA256

    3500472afed97376ad3a7b5e2ff007d8f9ac08fd0855da6891e39ca616e06d7e

  • SHA512

    b538693dd4c0ecc61ff5ffe11fcd578bc1f1e89c399b1f795237119fd72876cd2e6e0fafb426358981621802767feb6c01651e3369e6237a326e39e05a941da9

  • SSDEEP

    3072:OZkZmPw/Hh3ggzYsZYqNL2vLKzPNQjCnTwXVae84wXWsisygOAcDT+eUifIhe4N3:O+Zm4/Hh3ggzYsZYcL2voPNQjATwFdOr

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1115987525874487357/U1EPywzKSbwC3P0g1xAh2ZrzuSKGiUzHMyp3PzYX-XT7ky-5sVSMS3VP5aVty9_eFnq6

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3540-135-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections