Behavioral task
behavioral1
Sample
0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4.exe
Resource
win10v2004-20230221-en
General
-
Target
0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4.exe
-
Size
301KB
-
MD5
0b4ba47af1e6344479bc6e7a3ea05377
-
SHA1
2e8ae4d590e01df6ad8c1301ae711f440f176b16
-
SHA256
0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4
-
SHA512
a6a22f1a0146eb533445680346bc197155e3d7ee7dd14fcbb22dea0e672b940e8b77ff27cae0aa84da09facb9074ceb36cf1e5c6ad5ca0e6866bcd471fed6be6
-
SSDEEP
6144:BpfTPNUJy6VchcKaNSNnozBbN4jvy89eAlmc7Fb:/PSncjNoRqa80A
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
money123@@@
Signatures
-
AgentTesla payload 1 IoCs
resource yara_rule sample family_agenttesla -
Agenttesla family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4.exe
Files
-
0769c4bf125251b748677d2478b6afe130b621505975f7e25e991852be56d0a4.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 298KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ