Behavioral task
behavioral1
Sample
1356-59-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1356-59-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1356-59-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
2371cb85b2662387022d7707ae866c5b
-
SHA1
40a1e4429bca1b59db38828feb6c1e7309a407de
-
SHA256
f04437b34ba3ff3c18e4215d02c9e60fd24ed8af152f2d344c32351ab4469343
-
SHA512
ffbb50105e60535fc3180509744deaca27b2d0fc50680e07ed0a8857e82db127d46aeb11e8eb18af553da61588d12510a8d4d9b55d0a740e95b2927fa51a8852
-
SSDEEP
3072:uYQ7aqepkGcCU6NcQWVILnVrbEQXgf0s2ZpNBXvnJgBXlwC+DTZ83JDAmuZJzXgc:utuVNi2Hvnag6AmkdXg
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://195.58.39.94 - Port:
21 - Username:
[email protected] - Password:
product-secured##
Signatures
-
Agenttesla family
Files
-
1356-59-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ