Behavioral task
behavioral1
Sample
3932-139-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3932-139-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3932-139-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
6ef7501580efa362efb89e7982207679
-
SHA1
a1247d989ff026814f5a336bd1aafda25dd03da7
-
SHA256
c2519128bf733d587114675129fb2b60dafc6ec4dcdddb8fe73bc668dd163b45
-
SHA512
422881b2fdb5f5b9c6e939a3c8759550c178ba37d0343e4b1f7e9be69196d3b4d362fbd6fddaf617ef1135925300eba560f726c6024de54003b107fd654c8024
-
SSDEEP
6144:Kl+rTehvGkUKJumK14T186A0yMDMrTmz:Kl+rTyGGJZyrq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vhs-tr.com - Port:
587 - Username:
rifat@vhs-tr.com - Password:
$uugRUt3
Signatures
-
Agenttesla family
Files
-
3932-139-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ