Behavioral task
behavioral1
Sample
5088-134-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5088-134-0x0000000000400000-0x0000000000432000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
5088-134-0x0000000000400000-0x0000000000432000-memory.dmp
-
Size
200KB
-
MD5
dc065d0b6c3e3e3d5e2f768fd59df30e
-
SHA1
eaad95fb7bd6c8295a35d6ad7b2967dd4529942e
-
SHA256
4d44db93f8f4f4cbc07545672c375a85be9298dc0170e6a8d5c3a62dd5d51f4a
-
SHA512
d9707920e1d3c8569174da723fcf19ac60480118bf1f1e53724c28af57f9bf1ba1f71ed2f1566993ca3b7e24841e680bf5c5b9b6ff9feb19da0537f697890fbf
-
SSDEEP
6144:D1huKjNDKGE32U9Aiy1kV45mKmiGkELqM1H:D1huKjVE33vmEF
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.electrobist.com - Port:
21 - Username:
[email protected] - Password:
w&oNc9e]pf~4
Signatures
-
Agenttesla family
Files
-
5088-134-0x0000000000400000-0x0000000000432000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ