General

  • Target

    1728-9-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    2e80767ed1b2c2965344afeda5dccd75

  • SHA1

    31316d4be5ca298ce25cd7c8390b810d07f6dc74

  • SHA256

    a6f0f20ecdaf13528c553b0a3dc9f027afe19c891d7573d017a237692feeb336

  • SHA512

    4ff092dda3b3daeb438f1dd6648e46a596e6af4ac593e5ff6d17cd74a867b7cb1111e128383d8543089ece93f954b29ad3dd34c952363341910689281b7edcd6

  • SSDEEP

    3072:tOu83GNpNhN+rL0Vq8PCdh22WuH1HnL5J1j6Vdq/y4:tOu8WNpNhNiL0VgdhDlH1Hn5j6j

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7376263996:AAFDdYYEzKrO6kleV8yftZ3EiRPDabdl4eI/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-9-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections