Behavioral task
behavioral1
Sample
856-65-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
856-65-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
856-65-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
MD5
c619c86b37d53a024be01b152dd4d311
-
SHA1
055de9f8c6170c995f165fb6e3949f4537f7d4b7
-
SHA256
fdf394374ca158b18be4c1c0f1d0a09d81041103e1258f48a3ed5d30395e365c
-
SHA512
457327ecf7ff343b091a7fb07509552686e5c9b8d8f65537cd8cdf8af68b8f46c96a398c8df8b4ada6d125a5d56c1d131479b20251793684d03dde89eceb8fc9
-
SSDEEP
3072:CmQOGF6U/OtcMkGTggcMTUvMq01xnkoXDGtnrXVWHuCxKIuONup9:CtD8gZOULenHStxJCxLgp
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.cokyassarhalat.com - Port:
587 - Username:
[email protected] - Password:
zgOmGQH2
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
856-65-0x0000000000400000-0x000000000043C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ