Behavioral task
behavioral1
Sample
4888-134-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4888-134-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
4888-134-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
d0e99dd92d3e188a2f5d370f21bf8d4f
-
SHA1
db074784b6c9289faab664f9b3ebb45b4af9d355
-
SHA256
7f7ca6aed15fb8e547311b40f9a7e111085b738d7080fb1d8757f7e53053130d
-
SHA512
c5dbda994216cd660b9b4984de59fa1b97ed53a509d47682e8b6d2ebfca46bec1864ccf062499cc1259440db95a85836f3281ac04d13af6cc4efcd30c147bb9a
-
SSDEEP
6144:Ev9sMx6nLcSLkLPdR8xUpqn6bi7m/6x65mANQztsnbfuGfvX:Ev9sMQLiLPdNBbf3f
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Signatures
-
Agenttesla family
Files
-
4888-134-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ