General

  • Target

    1228-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    f01b8c53b13cf1f7af78fd6a352ac925

  • SHA1

    0184c2f4af71cb853e0368a5ea2cc013937bf401

  • SHA256

    e1fdd8b5a2aed7396f813ec8f60dcd75ae9c9e9a4016966c894d9b959eddf2f4

  • SHA512

    3a483438a6b81191b870cf7dfcdf32a263a06ecd50c825469a911d9e9973b36ae67a2a449664645f9a8a9ea7af1810e9f698a97d8489d17f82d3db2c77d3238b

  • SSDEEP

    3072:QrLPVMEg7XUclGNjC8dXVZzPuRR6y5M9bXe3r2w:QrLPVMEgrmNjCnRgm

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5826024468:AAHnmfd4YHZzd0kMFrB0m69yDHge4CayAHk/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1228-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections