General

  • Target

    3260-142-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    76a7165977873b01904c59abf0585047

  • SHA1

    1c5dd609aeffcb34fe797c1dde0d04854bc02147

  • SHA256

    0a148c15cc00ca0fed0a7b5db22b07cf51a7c4e9b852b7e6b1370728f886877e

  • SHA512

    4c3f7e7aa2e42a2a915096bfaffe0a0d1d58d607933ff8f484f9b5f95e05f5d914c6f74768ccd5b362d9fe07c581521f34ad0ad18d97f79ef916d06efe023367

  • SSDEEP

    3072:DaAIwpA4xHIv6NJsdFxDPoCTSdXVJz/vllxeSvBO/N3jelGps31mda3ea4iUPf0r:LTuTbSaTY+Q8nWCsvI7T

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3260-142-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections