General

  • Target

    1552-1455-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    6c3073ae794c3618e29da8263ab51816

  • SHA1

    7e8e21b98bf7f62ede53e731113530d176ef2f36

  • SHA256

    c6ed13545a76d02225d192e0a24b5121cd1daa1eca9326b2167e03cb8e5802ba

  • SHA512

    8490075bf7d71daa4b7a4f7f068b5b65f1a75012fe936617ca48142cb4ebc1f1b29368a9e4906568553b41c64d189fff3159fc0f73f74b452ebc7389e7f33741

  • SSDEEP

    3072:D/r7FM+IDK8KaVadf/hR+GiiVDV+Q7OfpNi37dcGnqPa:D/r7FM+IDbdVadRvRx+QiNiR

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5898210465:AAHyFwDD6wYeczE1-iD5JW8fxWZlN6uYVJ4/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1552-1455-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections