Behavioral task
behavioral1
Sample
1732-113-0x00000000002B0000-0x0000000000994000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1732-113-0x00000000002B0000-0x0000000000994000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1732-113-0x00000000002B0000-0x0000000000994000-memory.dmp
-
Size
6.9MB
-
MD5
e96707a9cbb8244b0e11a1c7fd19a234
-
SHA1
7e0ae99b9e553e263cf536b8ea2cf0ad972744b8
-
SHA256
ab11637c028be33402bf680f187e908ce4cffa8bc7ecc6ebae675767352be8f9
-
SHA512
a9ed11ca36c1a2c71439a7be601bbd23704e4e64c2f7378a8e8681db30361fd41715dd5cf3031e15d0c81d848385f90784de5be54666d35b1af38d6dcb300c51
-
SSDEEP
6144:GuiASPhYS2hREu+fZUd/sEJAp4lkhap64B+j5vqMgoe:GuGPhYS2EBfuHf
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5729374237:AAEdSD-W5rWlJyyU5nwVKvjLxJBT1jTdKRY/
Signatures
-
Agenttesla family
Files
-
1732-113-0x00000000002B0000-0x0000000000994000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ