Behavioral task
behavioral1
Sample
20f4ec03549be469302c0fcb5f55307680fd189aa733f90eb59cb2fbc34317cc.exe
Resource
win10v2004-20220812-en
General
-
Target
20f4ec03549be469302c0fcb5f55307680fd189aa733f90eb59cb2fbc34317cc
-
Size
216KB
-
MD5
218062e9c523ddde4ef872004bbe485e
-
SHA1
9395a880490f33999b1590a74b0c01452c1cfa05
-
SHA256
20f4ec03549be469302c0fcb5f55307680fd189aa733f90eb59cb2fbc34317cc
-
SHA512
eb1e418bbe428738dcf84386a927e598b393dc23d1269b918f9ff6105bc012803204c67e71f3f299aba52a93d2e0e3e8a91500020d15ed4a5a0bca950faf7297
-
SSDEEP
3072:qGWaoc6bOigxVb99b/Us6YHa9okXYoPKMtjtCltE251X1YbhnEjG+atUoWL:qhIxVvLU2aWkIW/ClPYbRCbGUo
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.jubana.cam - Port:
587 - Username:
[email protected] - Password:
3_sdYb:Q@pq5 - Email To:
[email protected]
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
Files
-
20f4ec03549be469302c0fcb5f55307680fd189aa733f90eb59cb2fbc34317cc.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 214KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ