Behavioral task
behavioral1
Sample
1292-56-0x0000000000400000-0x0000000000494000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1292-56-0x0000000000400000-0x0000000000494000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1292-56-0x0000000000400000-0x0000000000494000-memory.dmp
-
Size
592KB
-
MD5
c37d23fe26d27ef16ae920dc49782d3b
-
SHA1
3b9a3762be2c16870a6d3f6e916f61460faefe7b
-
SHA256
1aa3c783f54c659efca690f8e4753acc66234bc5f15ddea9608bfbc48f74bf99
-
SHA512
c0be218005278c93e295edd0cba0b8c36401d106b678bf44222952f11199f7c02fc3da1243ceb0a5efd2fe16f258c5f34ebc97317ea4e124d66bbeb7684b98a7
-
SSDEEP
6144:9g4hdy2a8ZxU/9S2UL+6rbaHDyw4+dFP:9g4ryX8ZKsaHTh
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.valvulasthermovalve.cl/ - Port:
21 - Username:
[email protected] - Password:
LILKOOLL14!!
Signatures
-
Agenttesla family
Files
-
1292-56-0x0000000000400000-0x0000000000494000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ