Behavioral task
behavioral1
Sample
544-140-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
544-140-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
544-140-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
b60eb947fc3c58f86c393effb9967668
-
SHA1
ff4bc18cf7fb00afc7e3e459b48ed3c11bf042da
-
SHA256
6a0030e2e38f79d8596d73e51ccac52b955825e45fa866fbebfe0ee3e2580fbf
-
SHA512
ef9794227b507584c78cfefa1c4b91c43165ada4ca126cd52a44458a97e77c76a6c523e812b0b341be76b32bdece9f59ff8fbebf90cbad15fa9d49778d11deb7
-
SSDEEP
3072:JJjhHHHUL9ObrVPWZ6tmU6CD3A2zzdxXDd/QlGAtSiI:JrHUxwVP0wjftxX5/cUi
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.supremeindia.com - Port:
587 - Username:
[email protected] - Password:
NBrepair@vvv321 - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
544-140-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ