Behavioral task
behavioral1
Sample
2004-68-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2004-68-0x0000000000400000-0x0000000000615000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2004-68-0x0000000000400000-0x0000000000615000-memory.dmp
-
Size
2.1MB
-
MD5
b359538b53e5cd7ea7e5eab32fa5369c
-
SHA1
ee35397a56898fa379c555f298f1dcf1c6ac8f69
-
SHA256
314879d54d02b6dda878f8d0c18beb4aa1a944a5b0ae70e6ca8733ff2797740e
-
SHA512
bfecd9e7a5069bb640e46578b2c7b57cc9e17bbe468842017bb3c56b3e3529371575b410b8ec88cf65b717807748089665f6a049143c16714018e8da7ecee5ae
-
SSDEEP
3072:yOYIdrXQPLHRf1I2gfuxawgfAVr38HW9KDKc10klqa9G+Y:xXQPLxdnFswbr3824xckV
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.homesteadgroove.com - Port:
21 - Username:
[email protected] - Password:
430M=DwOtIfm
Signatures
-
Agenttesla family
Files
-
2004-68-0x0000000000400000-0x0000000000615000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ