General

  • Target

    2164-9-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    95e376cc536c97e3bb021c1e29d1bb05

  • SHA1

    d81a5fed1465e28d69d137cfbefc0a65cce0b2b1

  • SHA256

    22e5d888f9f55f87d7f5d5c580172a4d21eacba63ce0caa7929f97add08d04c2

  • SHA512

    19cdfe0aa852f80324ce3eedebb4f4d18d523145a47e8de542f728733adb3b525d2a6cffe3dd853f41a3d6a309521711c7c4f2c91ce4b97d37646d84290d6b2b

  • SSDEEP

    3072:RGGPl/F91NlhTnIAVU9quEgVW9koBh5LMTZBXn:RGGPl/F91NlhTBbaboBMTZh

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7099320956:AAEbKuoPa3eGpVw59XdjZSpakl0EQvO5p9g/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-9-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections