Overview
overview
10Static
static
100d9e5116c1...e1.exe
windows7-x64
100d9e5116c1...e1.exe
windows10-2004-x64
10203dd97848...a7.exe
windows7-x64
1203dd97848...a7.exe
windows10-2004-x64
65d2a9e82b6...8f.exe
windows7-x64
75d2a9e82b6...8f.exe
windows10-2004-x64
7686e84d074...4d.exe
windows7-x64
686e84d074...4d.exe
windows10-2004-x64
ae30d28b17...a3.exe
windows7-x64
1ae30d28b17...a3.exe
windows10-2004-x64
6Behavioral task
behavioral1
Sample
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
203dd97848f29e54a66e575ae670288e8fd4a5a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
203dd97848f29e54a66e575ae670288e8fd4a5a7.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
5d2a9e82b6098813fa230152de286f7712b5608f.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
5d2a9e82b6098813fa230152de286f7712b5608f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
686e84d074c115785122ad304357729b28b4a54d.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
686e84d074c115785122ad304357729b28b4a54d.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
ae30d28b17fbce8e55203ad863c40bab8fe802a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ae30d28b17fbce8e55203ad863c40bab8fe802a3.exe
Resource
win10v2004-20220812-en
General
-
Target
samples.zip
-
Size
670KB
-
MD5
59e4d70fa46fc9ab83baef40caff18e7
-
SHA1
fc2e2b0bc5e63ef860a51edb360995c8f51e5f10
-
SHA256
278837977440d7f70135fa867391e3018fc871e3bfa50e22549db5acc6240afa
-
SHA512
2e5ab6240ca137357c020033c6517e38fe1f553f66f3bca11b2e3dfd4ba9719242eb8eb9017ec45eac83a8417886ce3c04118f04b1cd310f01ffff5e21e9c35a
-
SSDEEP
12288:uJCf+xlV0SWDTvyewOmMKfP13Lucpjz5/lG6cqZ1921LC6SFPkux+KRv2qYifE:Y+Ke6BLlQEmePPdOqYic
Malware Config
Signatures
-
AgentTesla payload 3 IoCs
Processes:
resource yara_rule static1/unpack001/0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1 family_agenttesla static1/unpack001/5d2a9e82b6098813fa230152de286f7712b5608f family_agenttesla static1/unpack001/686e84d074c115785122ad304357729b28b4a54d family_agenttesla -
Agenttesla family
Files
-
samples.zip.zip
Password: infected
-
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 332KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
203dd97848f29e54a66e575ae670288e8fd4a5a7.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
5d2a9e82b6098813fa230152de286f7712b5608f.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 330KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
686e84d074c115785122ad304357729b28b4a54d.exe windows x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 896KB - Virtual size: 893KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ae30d28b17fbce8e55203ad863c40bab8fe802a3.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ