General
-
Target
1916-68-0x00000000003B0000-0x00000000003E0000-memory.dmp
-
Size
192KB
-
MD5
eb4f1a9e35974091dd7a540cac37815e
-
SHA1
9e024c032f1d4098cf9a3a53329ca0200db8c23d
-
SHA256
aa645a45aca1b4a3860805db18fc590e1d652754730498e4a795e4fa3561af59
-
SHA512
37a8f4ba46b14e569dcb90a091c2954b6aa2bc6f8b425356c02ca548d6a05c898d2e455fff653d08ac55f1fcc23ba8b312641341b19d8b9b81e6b38650d907c2
-
SSDEEP
3072:L9Wp9VWBU6QisCwrBc3+fFICwpXZj4cYlkXUW4nY72O8Rkk3cwRYvuI970C:ifOZZjYI0QksD10
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ravv.sk - Port:
587 - Username:
[email protected] - Password:
bfE#vKaMi# - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
1916-68-0x00000000003B0000-0x00000000003E0000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ