Behavioral task
behavioral1
Sample
1936-194-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1936-194-0x0000000000400000-0x000000000043A000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1936-194-0x0000000000400000-0x000000000043A000-memory.dmp
-
Size
232KB
-
MD5
c05368b66efe5966e18fa4e0b35fc144
-
SHA1
e08539b61a2b5ec0d048c97dd9eddca4d812823d
-
SHA256
04e943c2230fc2fb7eb65303d112e415fc4f1fb60283c0a8d3046fc7fb1fa0ac
-
SHA512
29833d65608034ebcb0ac648d7cc68289a30e0e7a2cd32fcff5a04bdced471d731fd67eff66ec3cc6e500dd864132fa6c99ba098dd38ceb5bd813854b6e334b8
-
SSDEEP
3072:Tq2Iim2LcEAuOxoOIozLvrTkBCxRUUw/6pdQOU6xXS+SUaWzyQi2I/Lmg4CltLks:O2FGtBzLvrTDoUw/6pnCJyyxNqIltoa
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.instantprint.ro/ - Port:
21 - Username:
[email protected] - Password:
Playmen123#@
Signatures
-
Agenttesla family
Files
-
1936-194-0x0000000000400000-0x000000000043A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ