Behavioral task
behavioral1
Sample
520-67-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
520-67-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
520-67-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
f96fce556e609d569ec3149186b2afc2
-
SHA1
66cc0c3b7ff33adc219ebe34cad64046804c7786
-
SHA256
8ccc594630abca494ac8f5df7a8e58588f8ed4f268e7e24719b1970b4c17084c
-
SHA512
1a0691130505d2914b77180cf85be2a6e4d11c35a7f0d96eae9d702bfa06f37e52d927b0958c5ccae90c5434720927b3dc181a33900a2dc3818a428ac9bc8db5
-
SSDEEP
3072:tnhfK+w5ILi1qw5TtcO40faScdmmWNWF/zNmVFLnrnG8Isp:ZhfKThBcOXNYzN8FLTGFsp
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.akhtargroup.com.bd - Port:
587 - Username:
[email protected] - Password:
rck2013 - Email To:
[email protected]
Signatures
-
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 520-67-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
520-67-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ