Behavioral task
behavioral1
Sample
584-68-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
584-68-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
584-68-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
5a47eccaf545a11c55e3e2ecd569ff97
-
SHA1
714cab3d2799d9cd177b6b3fea0345e350eb18ce
-
SHA256
b438dab1fc2d7bc2d71c02e26f1fcb2a4f0cf908bad145e91121de296a1395b5
-
SHA512
38c38351e5387ac4b8e8774de1d32611982c9a295f50dd0c154f2867b3929e11f18453b42b20b95705787f727d244c2354ab29dc8cb8e4fb6303c1f530d318e8
-
SSDEEP
6144:TwnkThmYlyguDV7+QFUYOGEJAp4lkhap6qTZIUEDe:TwghmYlyPKQD
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5544798312:AAFCE9wlKN3YHM9MGYnKgWUb8D_lz2PBmQ8/
Signatures
-
Agenttesla family
Files
-
584-68-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ