Behavioral task
behavioral1
Sample
1920-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1920-65-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1920-65-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
817b35119f99cc30acb29f7a9898e300
-
SHA1
7597d02019d2d463256e8cd957abe6688a2c9103
-
SHA256
ab5007a3995145d8c279e56f35a2b7a694adc1e368554d7eaf887c957ad8b233
-
SHA512
52d9279b66a600740c3a4765306e1af38581c8ec3e934e3a7506f320fb77315b3a5a0e0d8322ac81555232738080309021e6bd071346a67f4614c79f9aae1745
-
SSDEEP
3072:GzfK6wlvcC1vS6C5WY5rRUIy0+ero7ezt9WVK31:OlQlNS6HItxroiz/ug1
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5818759233:AAFI7OlL_xF1C_H7nxAtSweMNNwegCdZOXs/
Signatures
-
Agenttesla family
Files
-
1920-65-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ