Behavioral task
behavioral1
Sample
1408-62-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1408-62-0x0000000000400000-0x000000000042E000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1408-62-0x0000000000400000-0x000000000042E000-memory.dmp
-
Size
184KB
-
MD5
89ffb63ec9214942e78fd39637b73551
-
SHA1
6011bf01251a6f03c061d76b52eb1b14cf2a8837
-
SHA256
a737133ff4dfe581bb1804a54b9b6b806cc89d70730c9fc3e16bc0a15e54983a
-
SHA512
53f80550aa779639c41f50d8d7438e7a599d540ac70cefe25ba1cb249cfc1945205864d925f7792467a151a82e1accd6c0a497091e4342458c32d2a61f58944d
-
SSDEEP
3072:38JRVBv0EjCXromEUsL8DFDn31H6r2Auhuk0HKNEkKFV7p3M:30t0EGcmEUkEhyhuhuk0HKepr7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.siliconsafepack.com - Port:
587 - Username:
[email protected] - Password:
mQqt$sHJba83 - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
1408-62-0x0000000000400000-0x000000000042E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ