Behavioral task
behavioral1
Sample
524-74-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
524-74-0x0000000000400000-0x0000000000444000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
524-74-0x0000000000400000-0x0000000000444000-memory.dmp
-
Size
272KB
-
MD5
2a6d25c3d729106704896c2843e172ca
-
SHA1
dfec3bc79223304b723a334e170ecf724e30c4e7
-
SHA256
2792780658b191723a9beed99a5be9fde86897870e72826a4a106a1ad2821d18
-
SHA512
09cd5ba3e8fff6cde47d819bb02a67704f48ddb39db413ac2a07ded0e9d717b352a7399423a594f3e3f277f6a1f7f8f34357e9cc1b5f0560c94cd507320ee97a
-
SSDEEP
3072:8oMqqaM97eOTPiK3Druiit/XbKjP39i8L2uSe6AUWDNUuVgVorf9OUrvT9L4soyq:fCteODDSzK788ilAQgUsOOtw
Malware Config
Signatures
-
Agenttesla family
-
resource yara_rule sample upx
Files
-
524-74-0x0000000000400000-0x0000000000444000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 119KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE