Behavioral task
behavioral1
Sample
1352-63-0x0000000000400000-0x0000000000438000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1352-63-0x0000000000400000-0x0000000000438000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1352-63-0x0000000000400000-0x0000000000438000-memory.dmp
-
Size
224KB
-
MD5
8a737ea393f42241313de6af9c35fd07
-
SHA1
bf0e8a255d48ab9ad6c763f96940ea4cf982941e
-
SHA256
145b2a7fbef4fad8c432d7a660fd8ccf3a3abaf59562be8bcb6fbfa81375e5ed
-
SHA512
2f9c3db6fb97083ef07f182143884da9d5f5958aa1e78cac261fe4fa6ccc9ec23800dc25f82905ef86f4f2e67175c0bf6b508934c7e803d5af6baa3d4d064def
-
SSDEEP
3072:l5L0D2Rp3ZhixbaoUTu2rUZdJLCfsxE4hL0HrQlSXnGIrjC:j0KVhCa7LrU3JusxE4hL0HrhXn7r
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5785453966:AAHyDcrcxKRlxeRJAm5lZv2UJcrh-c_GtQc/
Signatures
-
Agenttesla family
Files
-
1352-63-0x0000000000400000-0x0000000000438000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ