Behavioral task
behavioral1
Sample
5048-134-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5048-134-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
5048-134-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
392e92d8ffb047628b30401e94ee47d3
-
SHA1
fe59f58b5d44620fcd4fa5af811728ce794d7259
-
SHA256
3b15c4b70c129e787422670b475613b15b70c73565445c7f7de89debaa7340f0
-
SHA512
7dc3867530255aa9a72d2691555f9d0cd293689aa2a0ec698bfe2315cc23ac5f053300257a00c82f380e225e2a43e8de26d0a0a40a4457219d794f5f9d1e84b9
-
SSDEEP
6144:PYuWW5dG0wuv7Z0GB18GqzrU2aqvyHuTuTOVCh0yU82iZSS/VX:PYuWW11oI/
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Signatures
-
Agenttesla family
Files
-
5048-134-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ