Behavioral task
behavioral1
Sample
836-62-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
836-62-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
836-62-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
aa305e0ed7965e52e073d81b0f8df973
-
SHA1
a6b910027f5aeed3a925569f25472850e3114aa7
-
SHA256
aa87cd2050dc848934a8d28cb70a3e9a39757db89734c782e3aa14983d26e05d
-
SHA512
2c9acc04b4590ae7ec740df143a45890984eab08c47354cb406f12094a8691be641e9006215edf33c6ea005a1f3c48e7fd9a497b36fbd9022cdcf4ff0bc41079
-
SSDEEP
6144:YIthH5ZBsZCzlwUemdsJYRg1sBKZiu+SRZHbukHe:YIt15ZhzE+k
Malware Config
Signatures
-
Agenttesla family
Files
-
836-62-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ