Behavioral task
behavioral1
Sample
460-66-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
460-66-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
460-66-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
637cb9612c9952d3c45ba81f7aca0b9a
-
SHA1
a1f20708ac5925abf2298d58213332042794a535
-
SHA256
6704a75df455755cdc71860575fbece90f211049d0ce3eef38928ad3abf38f51
-
SHA512
609d8bcbe2d863e2d0593489c4fd037430f7e446a31b14536e8e8897440869f317da255752f47badc2c4d122ac018b7b3255e851bc1ad8133c706efcce0d9338
-
SSDEEP
3072:4MqqaM97eOTPiK3Druiih/XbKjP3YyCCBppw88uQ+JnWXoRn+bXO7NWwj7hw8UmN:qCteODD2zKDrHwUWXenSXAT5LJDm/
Malware Config
Signatures
-
Agenttesla family
-
resource yara_rule sample upx
Files
-
460-66-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 119KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE