Behavioral task
behavioral1
Sample
1992-89-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1992-89-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1992-89-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
d17d7cf98a34de496ee3683f39b820bd
-
SHA1
85dff8070b0758c93685789233fb426577ab580f
-
SHA256
0a09976b8b5bd7cf3c31d2fee053194aa6d7d53b13fa9a1b77c10b03e3cb257d
-
SHA512
e7770d5ae98b88be554e5abe89c949d2fac3ded67f4c8dba38b094320ef562f760b26082dbb798cc241da62148fa801296417b774d324bb29162d4fac799aa1f
-
SSDEEP
3072:p10ApGFlimt6+kS0RgOzj+q0tbq32cqp:bHMInVW5Vp
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
q)wn^GI4RLW88,JU&u - Email To:
[email protected]
Signatures
-
Agenttesla family
Files
-
1992-89-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ