Behavioral task
behavioral1
Sample
2432-153-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2432-153-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2432-153-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
dff760058f7d5f20902b7b3992b73a76
-
SHA1
ed886ab0bc645988c803ef4d86bd6fd9cebc77a3
-
SHA256
84ee71ff1da1c4275a14785eecbab0310e4b8f38253926e7f94f71bf21ad22a0
-
SHA512
1525295d417fac74153b551f658fc4117284c648f024469763ff341ae319bbe430e7b8e4eab95c4aac4c33edabae86abc4541f1f5fe1216348a166d066913ef1
-
SSDEEP
3072:OX/Ro0p9JF+De12n5PlebvIDu5DkVlbH8bXBrjREzDXk9:B0p9J+cSlEcDTVxuNEbk
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1098193000745672755/Wd6_n9CAMUpkgArKUcft1EqXvW3X0MTV136SSzy00JL4wVfT2dzL__3PN9ai9jnp03wC
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2432-153-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
2432-153-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ