Behavioral task
behavioral1
Sample
1800-67-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1800-67-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1800-67-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
643956bb9dd9911eebd11ed84278648d
-
SHA1
c18414742eab6474b5b39a9ee89c0d9fd0d48bf3
-
SHA256
6f9d2c415ddf9332e3135035e2167c8e7a95c1735754a496005dde4bd53fa6e6
-
SHA512
32bd293348e7522e98e5e5906077eb4ba967ebdfc036386f23388f4cd67f6feaf5eab2fdf50a53f07461d5a5a831e7033fe184a7932a871969fbf530c3d9266c
-
SSDEEP
6144:8ZSsarY/YMLnkd4X1NkUynbR01MdIxsHU/+A0chgyQXe:8ZErY/YMLk6lN3Q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
justice865
Signatures
-
Agenttesla family
Files
-
1800-67-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ