Behavioral task
behavioral1
Sample
892-67-0x0000000000400000-0x0000000000451000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
892-67-0x0000000000400000-0x0000000000451000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
892-67-0x0000000000400000-0x0000000000451000-memory.dmp
-
Size
324KB
-
MD5
43b4079d3ac7148f28c2b5cc1f291afc
-
SHA1
b2f7ce1ae2476c1cba3ccda9b78f5ca05fdd311e
-
SHA256
955ca307cf2af107cb9ca3a9a63377343b9d90bcacc0187cc3b606ffb477b3bc
-
SHA512
997514b52cc229c55f3a9ab6d5485f515302a2f5c4f37f9d0622a0985f6f00141289b33f1ae6125e884a0804ab2d30eef22e235d1d3190250a9df8abc7a6007b
-
SSDEEP
6144:sakCteODDPzK3KdH6mUQRCPLtcbbMDJlDnjOKUZD/vU:sve3XbdamGLm6jQ1
Malware Config
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
-
resource yara_rule sample upx
Files
-
892-67-0x0000000000400000-0x0000000000451000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 184KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE