Behavioral task
behavioral1
Sample
4168-134-0x0000000000400000-0x0000000000438000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4168-134-0x0000000000400000-0x0000000000438000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
4168-134-0x0000000000400000-0x0000000000438000-memory.dmp
-
Size
224KB
-
MD5
78ffc91b75c262eaf26d948f54f28918
-
SHA1
8d7ba88dc74eb17d278bff5ee23a121caae8983d
-
SHA256
6d2d93ed68778070d39140de1b31e2fd78ec2160f0989049a54d3e8a6b84a6e4
-
SHA512
b6953fc3401c0ba1f395260ae65ef7ae6c2d3551db28393a64b797df5f29194b2cd988a51950480d2542a01d6eac89cb0b2e2fb03fa8b15fc4a3d3f7510f9144
-
SSDEEP
3072:6Zzz72qt3JSrD7VcjNSU3RQW06fnwZ5SMBq7v1mX7fheLtFZoc7ZWLMB43oC5:kz6vnCpSUKFma5SMBq7NY2fZoEP63
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dms-est.com - Port:
587 - Username:
[email protected] - Password:
ab7865
Signatures
-
Agenttesla family
Files
-
4168-134-0x0000000000400000-0x0000000000438000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ