Behavioral task
behavioral1
Sample
1704-56-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1704-56-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1704-56-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
5cbdf2b0db6088849063807e5bbaae84
-
SHA1
ff6d2bea334853b4c371396e4a03df0ae990cb48
-
SHA256
f9321d17c5a423c80a006582f38ce26b0fb8854e6e8ffd82f25538d1688ab860
-
SHA512
05f4d9e8cde9e8a82caca6d66e738f7c8cd854f84a15b099d0067928cf755bc6f3bd263a8012adb7ed579697a29f60f11a82826c56b0f09234e09899abb024ef
-
SSDEEP
3072:1ENczufWB99K1H2dNUQD1vq2/4er2Wne22PIzGK1glWYbh:1Em9990H23UQA2dr2Wne22wR1mb
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5870878058:AAEtYpDY1LBnBQGwZvkWktoa3wzKq0kSk78/
Signatures
-
Agenttesla family
Files
-
1704-56-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ