Behavioral task
behavioral1
Sample
1724-201-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1724-201-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1724-201-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
602b16413f30e3932a4c60116c5fb39c
-
SHA1
4929f3713642c166bd844b60b90ae7e2a7a5d380
-
SHA256
d5578ff01ce3f334f73b87d5dd2b6c76b464d3a5dac36d429aa67c519b504fd1
-
SHA512
cbda9f36fd05fdd79bb406842f911de7c21748847d678d6630a3930c861afd28baa1b6ebe54073d5e1aa897b77d8f3aa818fd8a2840a5dfcb8f52de71ee3fceb
-
SSDEEP
3072:Z32j0wvbn8PcECsLK0iETyyWhdwZvyiZFKhUOpF0Nssz4a:Z32AwYPt1TuyPdZYnPS4
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5841268171:AAF5UCtwJJFHg-ZOPzcnm1oNf_eTuN08AjI/
Signatures
-
Agenttesla family
Files
-
1724-201-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ