Behavioral task
behavioral1
Sample
3020-160-0x0000000000400000-0x000000000062B000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3020-160-0x0000000000400000-0x000000000062B000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3020-160-0x0000000000400000-0x000000000062B000-memory.dmp
-
Size
2.2MB
-
MD5
0e3b9258f0e28b4f34bb5af23ad1e406
-
SHA1
1a7e7191346f4d9f213ae0de8c87bd2a81484a2b
-
SHA256
7acaa91444feb2cb610dfda5163276dd5afe37e9153911e5d65798af80d486c0
-
SHA512
7158665244436df381a36f724115c0b6d420dec577801a98b12140cec069202d30aee6fd6f7380a9718577257c4593ceb8318c31b86ab645be069b9c4a1f3773
-
SSDEEP
6144:0QdCfrBasrXR8mJULWa8RamtQvZIpxLIGZU8NBLa:0QdCf0sTR8NBInkOU8NB
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
aOid9JJ..9, - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
3020-160-0x0000000000400000-0x000000000062B000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ