Behavioral task
behavioral1
Sample
748-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
748-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
748-65-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
a800abbd95362a29e48537751f94e8a8
-
SHA1
d76be59c6f4534dd6380d0ea2a54e5d7ff7bebdf
-
SHA256
1971427e0cc698e8ab5b53c769cf2e02c306134a1cd6933672eb29ed20dc4f89
-
SHA512
df7bdc24f69ea40ec1cfc2550efb99a63a083f0bdbaccfab9790cea986e4a4d1471bad13923ea4d0c2c8ec2bf40f31374f75e07f4582f43e31b785d11d2fc9dc
-
SSDEEP
3072:KJbAOUforvHjb2jldwLWBybbDbILw/YMpOF0nY8zrsMD:KJbuWbWocEXpOFKzrVD
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5818759233:AAFI7OlL_xF1C_H7nxAtSweMNNwegCdZOXs/
Signatures
-
Agenttesla family
Files
-
748-65-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ