Behavioral task
behavioral1
Sample
2416-135-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2416-135-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2416-135-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
58922fc04066c85f6921a03f8df636bf
-
SHA1
8b01d304c276fe778d2f24954e4157f756e6bb65
-
SHA256
28c9311cf58a72d4f23a3abd698c33275a34ff3cbf104680c113dfb4e9d1c5ec
-
SHA512
9ef7a2693b52071db8c8978596c6e037bf7ec6b8251f350c71f3fd10dcd6f626880bbbcd95619f4663b50964a4935d57c682d87b508ec5fb437b885a929dfaa7
-
SSDEEP
6144:xhkj+lVhYSYR/CA5U+aOUddTCXy7eL2j4XsXYxVHfrBYJrYe:xhQ8VhYSYRli58rEr
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Signatures
-
Agenttesla family
Files
-
2416-135-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ