General

  • Target

    2288-14-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    0fd3c5b2318fbd5437785930f9e57604

  • SHA1

    2ed60e6a9ed48a1b24b7fde839ac6cf3dc30f57c

  • SHA256

    f10cc9c1f3ff5e35c00511c07e776673942c25c17af61b66f0966a6e2c6154d6

  • SHA512

    7ec0cc78ee2135c69d7f9187911b448c5d58e074cb14b9850a72e1b79489abf4caa97e5e04614536ca380d8766578404fbf486e8c1805e5838b618d64b3c8a3a

  • SSDEEP

    3072:EbGO+eOeQGvbY2Ii0RnW7a5M/LetrcI++X:EbGO+eOeQ4bYc7fLeJ

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1244832437658452009/aYLLzRVzlmUbOehfGuQ0o5MKae0agapFFaW-0Vs8McgyhwbIz-JCGQpbZ6dSTA-xAKGt

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2288-14-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections