Behavioral task
behavioral1
Sample
1352-63-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1352-63-0x0000000000400000-0x000000000043C000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1352-63-0x0000000000400000-0x000000000043C000-memory.dmp
-
Size
240KB
-
MD5
70a481f17c612d235dfc41f0789004e3
-
SHA1
3525194ee1a9cb35a868e81218fd7c63790e049f
-
SHA256
4c5002f7f4d716181712e6f6d5bbcae820d5a7456194b0a4a773ba648668850f
-
SHA512
acde1a630b3a7b529082a71fddd356f61ba8816b8e8090c872ca3f4f920fa306941a4d281b3577659a47c05de357d51696257b4b622e666a291d45496d750c63
-
SSDEEP
6144:fH2ClTXGPbPURuJuRQ1kIm7r/zcshE3xxrR/gn:vRiPbEPOH4n
Malware Config
Signatures
-
Agenttesla family
Files
-
1352-63-0x0000000000400000-0x000000000043C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ