General

  • Target

    2220-62-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    7814f6f24aa4ee38e30b2154c105ac80

  • SHA1

    3e33adc6c8a1f40d8982bdf81763d09a35f18177

  • SHA256

    e1892f9b56131c5dca042ae4dfef4fc9c181e0346170167172c2d94a0bdcb022

  • SHA512

    156db9f4c4cd0fc695eeda6a7392dafec26732c597f34b635d5e9b5a6c2187ab830df85fe1807b200535e4067e32bceae67955bac43db5f9f38e642790d0bea9

  • SSDEEP

    3072:Ce4CSIhy3K1/BrqCo+z2a2bYpOWUKBA2haDc:QIhyA/BDm7IA28

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discordapp.com/api/webhooks/1125974223203090482/oBPe_PF8sbWFzTxm8MjpxMr2KLnimz9IBhWKRewR1hr9_KcteS7VDMIqwmZXpQHf-6ZL

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2220-62-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections