General

  • Target

    3952-43-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    5f82612b0969d56bb612a69dd4dea461

  • SHA1

    3b15ae337cfcf15d988f59e497f1f5f244f174b8

  • SHA256

    1ad0436747d755488552aefc8382bfd386ba86c27f5915ae5ea25297fe6e948b

  • SHA512

    c62c28104e2de007af9a4ba3b3bf816bcf0cb6d381966e6be8b80d6052983b0758ed53fe226e52dbf5af2b1d087de05a6e73e93a9b67368d1574c86d769257ae

  • SSDEEP

    3072:SaXkYgrn90inDPjgmNnjJEg0/VWGUOx5fhdOVCd+yL:SaX9inDPjgmtJEg0dYOtdOw

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7062557814:AAFJ0MF0b9wa-ENiJCi7CNLUDP1tEYwJzMw/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3952-43-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections