General

  • Target

    2068-4-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    cb938989380a89e3d20e5f5b07b9d6bd

  • SHA1

    a4f463039e2a519c3ec6a45fa4adb129024fc666

  • SHA256

    4c97d58b4de8e1b9b5e77d2196cc522a56d065e06d1763e76e948b371ce7b7d1

  • SHA512

    c48a7d03f29aaa023bf098502d5ce8baba44c16e3dc5bd8145a95ff11a2896d3623afe48a85a014e04716bccd98d052edef39ad42504f507b751648acdd01984

  • SSDEEP

    3072:jfULiQgYPuuZJWQ8L6SqA8+BryEaeG/5t8/gd5E2G:jfULiQgYPuuZr8L6Sm6GTYgd2

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6542794227:AAFN3zw1IO9ShlzjqfCM2wKZwSz3yRGzRas/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2068-4-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections