General

  • Target

    1096-66-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    26d448a177012183c80a94d148bbfd08

  • SHA1

    51f9c007f1c483ddb7b7d4c39a1912d8c422c234

  • SHA256

    7130db111dfd9cbbda630e676c33aee88b02237e588202fcfaa138f36238ac09

  • SHA512

    d11051f4748fe93305d917eb8b1851f77cdc3296851eb71e38d20271303224420a55f37049a6a82658fd9f41dfa24237c9395efcf460a71593f4438d41b994de

  • SSDEEP

    3072:Ht4/4c7BSRpsrnjq6HsZL5JO97l/ePv2kbuLvbbWvfSJD:Ht4/wjsfs9y2qbr

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6315041747:AAG93StI4eix8H1rw-GgyOx8Gz5MZ6QEMJ4/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1096-66-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections