Behavioral task
behavioral1
Sample
1688-56-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1688-56-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1688-56-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
7fd07e22ee60f86fb461307004c9ab85
-
SHA1
91e09940299b973bfbcfd07ae2fe3970a6cccb1c
-
SHA256
1d5de4dd446039d7c34a94261333e33d70d9759c3fd5c7eedab00975fdad1d5c
-
SHA512
a200738d0297e7d07c104dfa5d0c4ec4c4f832f6d03f299fabd189973a6440c1de5252cecf56dd7cbd0fd2bffeba7accbde01eae4f65743bb4f6c9286fe73f40
-
SSDEEP
3072:IR/oEbRSM8amGmXNL30yL4AEMUL4umEYaRF1ahPcz8MUrKbA/F5I/RRKuOyGRfAa:OURF0qUcLEFjaPMPqH7opIGTIFsV
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.code-jet.com - Port:
21 - Username:
[email protected] - Password:
F$T3)1@zYr&V
Signatures
-
Agenttesla family
Files
-
1688-56-0x0000000000400000-0x0000000000440000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ