Behavioral task
behavioral1
Sample
1832-70-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1832-70-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1832-70-0x0000000000400000-0x0000000000615000-memory.dmp
-
Size
2.1MB
-
MD5
9b9d8269d3b6fa71df4daa5849920776
-
SHA1
e3666db549cfaff992f06b216a3dca96fafb6dd8
-
SHA256
23ce71aa298b1d7f6d7078065dc9b66a5cca47423628f1f9228dea362cdde59f
-
SHA512
ecf80a47e4a4259e071edf2d35a8ff151b2432ff2aa6d93c6e1124359a05ef4f21a6a5d31de307e8a6ef7fabfabf86ee9297171b1bd24da8be55b7120a64ec5b
-
SSDEEP
3072:Oct2lFITjzhuTOisc6AaUsKYFwaKU5B2jjksvTwZkSbH2AJ2P7z6RPjh8r6Ne+y8:9tjQb6Aa1zWU5B2jjkH1bHI7z62+QD
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.onogost.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
Agenttesla family
Files
-
1832-70-0x0000000000400000-0x0000000000615000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ